Impact
OpenClaw versions older than 2026.3.22 contain a flaw that lets queued node actions be executed without re‑checking against the current command policy. An attacker can exploit the persistence of stale allowlists or declarations that survived prior policy tightening to run commands that should be blocked. This can lead to unauthorized execution of commands and potentially compromise system integrity.
Affected Systems
The affected product is OpenClaw, distributed by the vendor OpenClaw. All installations running a release earlier than 2026.3.22 are vulnerable, unless a newer release or corrective update has been applied.
Risk and Exploitability
The CVSS score of 2.3 indicates low severity, and no EPSS data is available to quantify exploit probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require the attacker to be able to enqueue node actions—either by injecting them or by leveraging existing queued actions that survived a policy update. The attack vector is inferred from the description and not directly stated in the input. Because the flaw is a bypass rather than a direct execution path, the risk remains limited but can increase if configuration drift allows stale commands to remain queued.
OpenCVE Enrichment
Github GHSA