Impact
A discrepancy between rawCommand and command[] variables in the node host system.run handler allows the system to perform allowlist or approval checks against one command while executing a different argv array. This flaw can enable an attacker who can invoke system.run to bypass defined security policies and execute arbitrary code, compromising system confidentiality, integrity, and availability.
Affected Systems
All OpenClaw installations older than version 2026.2.14 that use the node host companion execution path and have security=allowlist enabled with ask=on-miss approval prompting. Configurations that do not use the node host or do not enable allowlist-based exec policy are not affected. The flaw appears in the openclaw:openclaw product for Node.js environments.
Risk and Exploitability
The CVSS score is 7.2, indicating a moderate to high severity vulnerability. The EPSS score is less than 1 percent, suggesting a very low likelihood of exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to be able to trigger system.run, typically through exposed APIs or local access. Once triggered, the attacker can circumvent policy checks and launch arbitrary commands.
OpenCVE Enrichment
Github GHSA