Impact
OpenClaw versions before 2026.2.22 on macOS contain a path validation flaw in the exec-approval allowlist mode. The defect arises when the allowlist contains only basename entries; attackers can exploit the fallback behavior by placing a malicious binary with the same name as an approved executable in a different directory. This bypasses the intended path-based policy and allows a local attacker to run arbitrary commands, potentially compromising the system. The weakness is a form of directory traversal, as identified by CWE‑426.
Affected Systems
OpenClaw software, versions older than 2026.2.22, running on macOS. Users who have configured security=allowlist and ask=on-miss are affected. No other operating systems or product versions are listed.
Risk and Exploitability
The CVSS base score is 7.3, indicating high severity. EPSS indicates a low probability of exploitation (<1 %). The vulnerability is not on the CISA KEV list. Exploit requires local file‑system access and sufficient privileges to launch OpenClaw. An attacker who can write or modify files in a directory where basename‑only allowlist entries appear can drop a malicious binary with the same name as an approved executable and trigger its execution. Normal user privileges are enough to exploit the flaw once OpenClaw is started.
OpenCVE Enrichment
Github GHSA