Impact
The vulnerability allows an attacker to replace approved local scripts that are executed via the pnpm dlx command without invalidating the existing approval plan, enabling the execution of malicious script contents. This results in unauthorized code execution on the host system.
Affected Systems
The flaw affects OpenClaw configurations released before version 2026.4.2. Any deployment that relies on pnpm dlx to run user‑approved local scripts is susceptible.
Risk and Exploitability
The CVSS score of 5.4 indicates a moderate severity, and the EPSS score of less than 1% shows a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector requires the attacker to invoke pnpm dlx in an environment where local script execution is permitted, suggesting a local or privileged user scenario.
OpenCVE Enrichment