Impact
OpenClaw contains an authentication bypass in the allow-always wrapper persistence logic that lets remote attackers bypass approval checks by persisting wrapper-level allowlist entries without validating the inner executable intent. This flaw is classified as CWE-78 and can result in remote code execution: attackers can approve benign wrapped system.run commands and later execute arbitrary payloads on gateway and node-host execution flows.
Affected Systems
Affect all OpenClaw installations prior to version 2026.2.22. The product is OpenClaw running on Node.js, as indicated by the CPE entry. Administrators should verify that their deployments do not use a version older than 2026.2.22.
Risk and Exploitability
The CVSS base score of 7.1 reflects a medium‑to‑high severity. The vulnerability can be remotely exploited via crafted wrapper requests; the description states that attackers can approve benign wrapped commands and subsequently execute arbitrary payloads, achieving full remote code execution. No EPSS score is available, and the issue is not listed in CISA’s KEV catalog, but the absence of public exploit data does not reduce the potential risk. The attack vector is inferred from the description as a remote vector involving network access to the OpenClaw instance and the ability to submit a wrapper for approval.
OpenCVE Enrichment
Github GHSA