Impact
OpenClaw versions prior to 2026.2.24 contain a policy bypass in the safeBins allowlist evaluation that blindly trusts static default directories such as /opt/homebrew/bin and /usr/local/bin. These directories are writable by package‑manager users, allowing an attacker to place a malicious binary that has the same name as a permitted executable. When OpenClaw references the binary, the attacker’s code is executed within the OpenClaw runtime context, giving the attacker arbitrary command execution. The vulnerability is a classic example of CWE‑426: Untrusted Search Path exploitation.
Affected Systems
Affected systems are all deployments of OpenClaw where the version is less than 2026.2.24. Vendors and users must confirm that their OpenClaw installation meets the pre‑2026.2.24 version criteria and check the safeBins configuration to ensure that the default directories are present.
Risk and Exploitability
The CVSS score of 7 reflects a high impact for potential local attackers. EPSS data is not available, but the vulnerability is listed as not in KEV, suggesting it may not be widely exploited yet. The likely attack vector is a local attacker who has write permission on /opt/homebrew/bin or /usr/local/bin; by placing a malicious binary with a matching name to a trusted executable, the attacker gains arbitrary command execution within the OpenClaw process. The impact is limited to the context of the OpenClaw runtime and does not inherently provide system‑wide access, but it can be leveraged to compromise the host if additional privileges are attainable.
OpenCVE Enrichment
Github GHSA