Description
OpenClaw before 2026.4.2 contains an approval integrity vulnerability in pnpm dlx that fails to bind local script operands consistently with pnpm exec flows. Attackers can replace approved local scripts before execution without invalidating the approval plan, allowing execution of modified script contents.
Published: 2026-04-23
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Code Execution
Action: Upgrade
AI Analysis

Impact

The vulnerability allows an attacker to replace approved local scripts that are executed via the pnpm dlx command without invalidating the existing approval plan, enabling the execution of malicious script contents. This results in unauthorized code execution on the host system.

Affected Systems

The flaw affects OpenClaw configurations released before version 2026.4.2. Any deployment that relies on pnpm dlx to run user‑approved local scripts is susceptible.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate severity, and the EPSS score of less than 1% shows a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector requires the attacker to invoke pnpm dlx in an environment where local script execution is permitted, suggesting a local or privileged user scenario.

Generated by OpenCVE AI on April 28, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.4.2 or later to patch the approval integrity flaw.
  • Revoke and re‑issue approvals for any local scripts that might have been replaced, and re‑approve them after validating their source integrity.
  • Disable or restrict the use of pnpm dlx for executing local scripts where possible, and enforce least‑privilege permissions to mitigate the risk of executing unapproved code.

Generated by OpenCVE AI on April 28, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.2 contains an approval integrity vulnerability in pnpm dlx that fails to bind local script operands consistently with pnpm exec flows. Attackers can replace approved local scripts before execution without invalidating the approval plan, allowing execution of modified script contents.
Title OpenClaw < 2026.4.2 - Approval Integrity Bypass in pnpm dlx Local Script Binding
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-367
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-24T10:56:31.091Z

Reserved: 2026-04-20T14:09:02.628Z

Link: CVE-2026-41360

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T22:16:43.703

Modified: 2026-05-01T20:24:08.360

Link: CVE-2026-41360

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:45:16Z

Weaknesses