Impact
OpenClaw versions prior to 2026.3.22 contain an allowlist bypass in system.run approvals that fails to unwrap /usr/bin/time wrappers. The flaw, a manifestation of CWE-706 (Incorrect Authorization), permits attackers to circumvent executable binding restrictions and execute arbitrary commands by reusing approval state through an unregistered time wrapper.
Affected Systems
All versions of the OpenClaw application prior to 2026.3.22 are vulnerable. Affected systems include deployments of OpenClaw running on any platform supported by the open-source project, as discerned from the cpe entry cpe:2.3:a:openclaw:openclaw. All users of these versions should verify whether they use the system.run feature with /usr/bin/time wrappers.
Risk and Exploitability
The CVSS score of 7.7 reflects a high severity impact. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, but the flaw can still be leveraged by an attacker with the ability to invoke system.run. The likely attack vector involves users with local execution privileges providing a specially crafted path that includes the time wrapper, allowing the attacker to execute inner commands with elevated rights. Exploitation requires no additional software and can occur once the vulnerable binary is in the system’s PATH.
OpenCVE Enrichment
Github GHSA