OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute modified code under the approved run context.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/security/advisories/GHSA-qc36-x95h-7j53 | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-unrecognized-script-runners | Third Party Advisory |
Configurations
History
30 Mar 2026, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw
Openclaw openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-qc36-x95h-7j53 - Mitigation, Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-unrecognized-script-runners - Third Party Advisory |
Information
Published : 2026-03-29 13:17
Updated : 2026-03-30 17:15
NVD link : CVE-2026-32978
Mitre link : CVE-2026-32978
CVE.ORG link : CVE-2026-32978
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-863
Incorrect Authorization
