Description
OpenClaw versions prior to 2026.2.25 contain an approval-integrity bypass vulnerability in system.run where rendered command text is used as approval identity while trimming argv token whitespace, but runtime execution uses raw argv. An attacker can craft a trailing-space executable token to execute a different binary than what the approver displayed, allowing unexpected command execution under the OpenClaw runtime user when they can influence command argv and reuse an approval context.
Published: 2026-03-21
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: arbitrary command execution
Action: Immediate patch
AI Analysis

Impact

OpenClaw prior to version 2026.2.25 contains a flaw in the system.run command where the rendered approval identity is trimmed of trailing whitespace, but the runtime execution uses the raw argv value. An attacker can craft a command argument that appears identical to the approver’s view, yet contains a trailing space that changes the executable path. This allows execution of an unexpected binary under the OpenClaw runtime user, effectively bypassing approval integrity checks and enabling arbitrary code execution as that user.

Affected Systems

The vulnerability affects the OpenClaw platform, specifically all releases before 2026.2.25. The impact is tied to the Node.js runtime used by OpenClaw. Users running any of these unsupported versions are potentially susceptible when they can influence command arguments within an approved context.

Risk and Exploitability

The CVSS score of 5.7 indicates a medium severity. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is likely local or requires the ability to create or reuse an approval context within OpenClaw, which may be achievable by an authenticated or privileged user. Exploitation requires manipulating argv arguments in an approved command, leading to execution of a different binary than shown to the approver.

Generated by OpenCVE AI on March 21, 2026 at 06:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.25 or later to eliminate the approval identity mismatch vulnerability.

Generated by OpenCVE AI on March 21, 2026 at 06:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hwpq-rrpf-pgcq OpenClaw: system.run approval identity mismatch could execute a different binary than displayed
History

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.25 contain an approval-integrity bypass vulnerability in system.run where rendered command text is used as approval identity while trimming argv token whitespace, but runtime execution uses raw argv. An attacker can craft a trailing-space executable token to execute a different binary than what the approver displayed, allowing unexpected command execution under the OpenClaw runtime user when they can influence command argv and reuse an approval context.
Title OpenClaw < 2026.2.25 - Approval Identity Mismatch in system.run Command Execution
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-436
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N'}

cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-21T03:38:13.744Z

Reserved: 2026-03-10T19:52:08.741Z

Link: CVE-2026-32065

cve-icon Vulnrichment

Updated: 2026-03-21T03:38:09.956Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T01:17:09.893

Modified: 2026-03-24T21:09:40.450

Link: CVE-2026-32065

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:52Z

Weaknesses