CVE-2026-32978

OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute modified code under the approved run context.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

30 Mar 2026, 17:15

Type Values Removed Values Added
First Time Openclaw
Openclaw openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-qc36-x95h-7j53 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-qc36-x95h-7j53 - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-unrecognized-script-runners - () https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-unrecognized-script-runners - Third Party Advisory

Information

Published : 2026-03-29 13:17

Updated : 2026-03-30 17:15


NVD link : CVE-2026-32978

Mitre link : CVE-2026-32978

CVE.ORG link : CVE-2026-32978


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-863

Incorrect Authorization