Impact
Key detail from CVE description: OpenClaw versions prior to 2026.2.22 contain an allowlist parsing mismatch in the macOS companion app that allows authenticated operators to bypass exec approval checks. This flaw enables the creation of shell‑chain payloads that are incorrectly validated as allowed, leading to the execution of arbitrary commands on the paired macOS host. The vulnerability is identified as CWE‑184 and poses a potential compromise of confidentiality, integrity, and availability through privileged command execution.
Affected Systems
The affected systems are all OpenClaw releases before 2026.2.22. The macOS companion application in those versions permits the mis‑parsing of the allowlist. No other vendors or product lines are listed as affected.
Risk and Exploitability
Key detail from score data: CVSS Score 5.6 indicates a moderate risk level. Since EPSS data is not available and the exploit requires operator.write privileges and a paired macOS beta node, the likelihood of exploitation is limited to environments where such roles and nodes exist. The vulnerability is not listed in CISA’s KEV catalog, suggesting no confirmed wild exploits as of the available data.
OpenCVE Enrichment
Github GHSA