CVE-2026-32979

OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local code by modifying scripts between approval and execution when exact file binding cannot occur. Remote attackers can change approved local scripts before execution to achieve unintended code execution as the OpenClaw runtime user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

30 Mar 2026, 15:56

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw
Openclaw openclaw
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-xf99-j42q-5w5p - () https://github.com/openclaw/openclaw/security/advisories/GHSA-xf99-j42q-5w5p - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-unbound-interpreter-and-runtime-commands-bypass-in-node-host-approval - () https://www.vulncheck.com/advisories/openclaw-unbound-interpreter-and-runtime-commands-bypass-in-node-host-approval - Third Party Advisory

Information

Published : 2026-03-29 13:17

Updated : 2026-03-30 15:56


NVD link : CVE-2026-32979

Mitre link : CVE-2026-32979

CVE.ORG link : CVE-2026-32979


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition