Impact
OpenClaw versions prior to 2026.3.11 possess an approval‑integrity flaw in the node‑host system.run approval process that displays extracted shell payloads but actually executes a different argv. This mismatch allows an attacker to craft wrapper binaries or command wrappers that, after an operator accepts the misleading command text, run arbitrary local commands. The result is an unintended execution of code on the target system, compromising its integrity and potentially leading to further compromise.
Affected Systems
The affected product is OpenClaw OpenClaw. All releases before 2026.3.11 are impacted. The vulnerability is present in the Node.js‑based node‑host component of the application.
Risk and Exploitability
The CVSS score is 7.3, indicating a high severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an attacker to have access to submit a command for approval through the OpenClaw UI, implying a need for user credentials or social engineering. The likely attack vector is an internal or compromised account that can submit a command for approval, leading to local code execution after operator approval.
OpenCVE Enrichment