Impact
OpenClaw versions before 2026.4.12 contain a weakened exec approval binding flaw in the busybox and toybox applet execution path. This flaw is a CWE-863 weakness, involving insufficient granular approval controls, and the vulnerability lets an attacker obscure which applet will actually run, allowing the bypass of exec approval mechanisms. This can result in the execution of unsafe applets without the intended risk classification, essentially granting control over arbitrary code execution within the application context.
Affected Systems
The flaw affects the OpenClaw product series, specifically all releases from 2026.2.23 up to and including 2026.4.11. The affected binary uses busybox and toybox applets for execution. No other vendors or versions are known to be impacted.
Risk and Exploitability
The CVSS score is 8.7, indicating high severity. The EPSS score is unavailable, and the vulnerability is not listed in CISA KEV, which suggests it has not yet been exploited in the wild. Attackers would need to craft or supply an opaque multi-call binary that uses the weakened binding to trick the exec approval process. The impact is remote code execution within the OpenClaw environment, and the lack of a proper approval check makes the exploitation likely if an attacker can deliver a malicious applet.
OpenCVE Enrichment
Github GHSA