Impact
OpenClaw prior to 2026.3.28 contains an execution approval vulnerability that allows attackers to persistently trust wrapper carrier executables rather than the intended target executables. By manipulating positional routing through dispatch wrappers, attackers can extend the allowlist beyond its intended scope, effectively enabling arbitrary code execution within the application. This weakness permits unauthorized operations with the privileges of the executing process.
Affected Systems
The vulnerability affects the OpenClaw application version prior to 2026.3.28; any installation of the openclaw:openclaw product on Node.js without the security patch is susceptible. Affected versions are all releases older than 2026.3.28.
Risk and Exploitability
The CVSS score of 7 indicates high severity. The EPSS score is not available, so the likelihood of exploitation remains uncertain, but the lack of a KEV listing suggests no widespread incidents yet. An attacker would need the ability to influence execution routing within OpenClaw, which may be possible for local or remote attackers depending on how the application is exposed. If compromised, the attacker could gain full control over code execution within the system.
OpenCVE Enrichment