Impact
OpenClaw licensed prior to 2026.3.28 fails to unwrap program wrappers such as /usr/bin/script when recording trust decisions. An attacker who can persuade a user to approve a wrapper can persist that approval, allowing the wrapper to execute different underlying commands. This bypass compromises the integrity of the execution allowlist, potentially enabling persistent execution of arbitrary code while appearing authorized.
Affected Systems
OpenClaw Software – versions earlier than 2026.3.28 are affected. The vulnerability applies to all installations that use the default allowlist mechanism for executables.
Risk and Exploitability
The CVSS score of 7 indicates a moderate‑to‑high severity. No EPSS data is provided and the issue is not listed in the KEV catalog, suggesting no known public exploitation, but the flaw is local‑user/privileged and can be leveraged if a user is tricked into approving a wrapper. Once the wrapper is trusted, any program invoked through that wrapper can run with elevated privileges, presenting a significant risk to confidentiality, integrity, and availability.
OpenCVE Enrichment