OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local code by modifying scripts between approval and execution when exact file binding cannot occur. Remote attackers can change approved local scripts before execution to achieve unintended code execution as the OpenClaw runtime user.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/security/advisories/GHSA-xf99-j42q-5w5p | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-unbound-interpreter-and-runtime-commands-bypass-in-node-host-approval | Third Party Advisory |
Configurations
History
30 Mar 2026, 15:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw
Openclaw openclaw |
|
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-xf99-j42q-5w5p - Mitigation, Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-unbound-interpreter-and-runtime-commands-bypass-in-node-host-approval - Third Party Advisory |
Information
Published : 2026-03-29 13:17
Updated : 2026-03-30 15:56
NVD link : CVE-2026-32979
Mitre link : CVE-2026-32979
CVE.ORG link : CVE-2026-32979
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
