Impact
OpenClaw version 2026.3.1 contains an approval integrity vulnerability where the system.run function rewrites its argv array, changing the command to be executed. This allows an attacker who can place malicious scripts in the working directory to have those scripts run even though the operator has approved a different command. The weakness is identified as CWE‑88 and results in the unintended execution of local code, in effect bypassing the intended approval controls.
Affected Systems
Affected product: OpenClaw (vendor OpenClaw). The vulnerability exists in version 2026.3.1 and earlier, as indicated by the CPE entries. No later releases (2026.3.2 or later) are listed as affected.
Risk and Exploitability
The CVSS score of 5.4 classifies the issue as medium severity. The EPSS score of less than 1% suggests low historical exploitation likelihood, and the vulnerability is not currently listed in the CISA KEV catalog. Based on the description, the attack requires local file write ability or pre‑existing local script placement, implying an attacker must have some local influence on the system or obtain a file via another vulnerability. The potential impact is the execution of arbitrary local code, which could lead to privilege escalation or further compromise if the process runs with sufficient rights.
OpenCVE Enrichment
Github GHSA