Impact
OpenClaw software contains an approval integrity flaw in its system.run function. The vulnerability allows the bypass of approval checks for certain script runners such as tsx and jiti. An attacker who can trick the system into approving a benign script command can subsequently rewrite the referenced script file on disk and then execute the altered code under the already approved run context. This results in arbitrary code execution with the privileges of the running process, potentially compromising confidentiality, integrity, and availability of the affected system.
Affected Systems
Any installation of OpenClaw prior to version 2026.3.11 is potentially vulnerable. The vulnerability is present in all builds before the 2026.3.11 release across all supported platforms when the system.run feature is enabled and unrecognized script runners are allowed to be executed.
Risk and Exploitability
The CVSS score for this issue is 9.4, indicating a high severity level. The exploit probability score is not available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is inferred to be local or remote exploitation through privileged script execution, depending on the attacker’s ability to influence the approval process or modify script files. If the attacker can obtain file write access and trigger system.run, the flaw can be leveraged to run arbitrary code.
OpenCVE Enrichment
Github GHSA