Description
OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows allow-always persistence to trust wrapper carrier executables instead of invoked targets. Attackers can exploit positional carrier executable routing through dispatch wrappers to establish broader allowlist entries than intended, weakening execution approval boundaries.
Published: 2026-04-28
Score: 7 High
EPSS: n/a
KEV: No
Impact: Execution approval bypass allowing arbitrary code execution
Action: Patch to 2026.3.28 or newer
AI Analysis

Impact

OpenClaw prior to 2026.3.28 contains an execution approval vulnerability that allows attackers to persistently trust wrapper carrier executables rather than the intended target executables. By manipulating positional routing through dispatch wrappers, attackers can extend the allowlist beyond its intended scope, effectively enabling arbitrary code execution within the application. This weakness permits unauthorized operations with the privileges of the executing process.

Affected Systems

The vulnerability affects the OpenClaw application version prior to 2026.3.28; any installation of the openclaw:openclaw product on Node.js without the security patch is susceptible. Affected versions are all releases older than 2026.3.28.

Risk and Exploitability

The CVSS score of 7 indicates high severity. The EPSS score is not available, so the likelihood of exploitation remains uncertain, but the lack of a KEV listing suggests no widespread incidents yet. An attacker would need the ability to influence execution routing within OpenClaw, which may be possible for local or remote attackers depending on how the application is exposed. If compromised, the attacker could gain full control over code execution within the system.

Generated by OpenCVE AI on April 28, 2026 at 23:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.28 or later, which contains a fixed execution approval check.
  • Restrict the use of wrapper carrier executables to trusted sources and disable or limit dispatch wrapper routing where possible.
  • Verify that execution approval configuration files do not contain overly broad allowlist entries and align them with intended application behavior.
  • Enable comprehensive logging of execution approvals to detect anomalous routing or allowlist changes.

Generated by OpenCVE AI on April 28, 2026 at 23:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows allow-always persistence to trust wrapper carrier executables instead of invoked targets. Attackers can exploit positional carrier executable routing through dispatch wrappers to establish broader allowlist entries than intended, weakening execution approval boundaries.
Title OpenClaw < 2026.3.28 - Arbitrary Execution Allowlist via Wrapper Carrier Executables
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-807
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-29T12:45:49.537Z

Reserved: 2026-04-20T14:12:09.519Z

Link: CVE-2026-41380

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T19:37:40.957

Modified: 2026-04-28T20:10:23.367

Link: CVE-2026-41380

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T23:15:43Z

Weaknesses