Description
OpenClaw versions 2026.2.23 before 2026.4.12 contain a weakened exec approval binding vulnerability in busybox and toybox applet execution that allows attackers to obscure which applet would actually run. Attackers can exploit opaque multi-call binaries to bypass exec approval mechanisms and weaken risk classification of unsafe applet invocations.
Published: 2026-05-05
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw versions before 2026.4.12 contain a weakened exec approval binding flaw in the busybox and toybox applet execution path. This flaw is a CWE-863 weakness, involving insufficient granular approval controls, and the vulnerability lets an attacker obscure which applet will actually run, allowing the bypass of exec approval mechanisms. This can result in the execution of unsafe applets without the intended risk classification, essentially granting control over arbitrary code execution within the application context.

Affected Systems

The flaw affects the OpenClaw product series, specifically all releases from 2026.2.23 up to and including 2026.4.11. The affected binary uses busybox and toybox applets for execution. No other vendors or versions are known to be impacted.

Risk and Exploitability

The CVSS score is 8.7, indicating high severity. The EPSS score is unavailable, and the vulnerability is not listed in CISA KEV, which suggests it has not yet been exploited in the wild. Attackers would need to craft or supply an opaque multi-call binary that uses the weakened binding to trick the exec approval process. The impact is remote code execution within the OpenClaw environment, and the lack of a proper approval check makes the exploitation likely if an attacker can deliver a malicious applet.

Generated by OpenCVE AI on May 5, 2026 at 12:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenClaw 2026.4.12 or later. This release removes the weakened exec approval binding and restores proper applet verification.
  • If an immediate upgrade is not possible, restrict or disable busybox and toybox applet execution until a patch can be applied. This limits the attack surface that the flaw relies on.
  • Review and tighten exec approval configurations to ensure that applet names are strictly validated against a whitelist before execution. This mitigates the effect of any future binding weaknesses.

Generated by OpenCVE AI on May 5, 2026 at 12:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2cq5-mf3v-mx44 OpenClaw: busybox and toybox applet execution weakened exec approval binding
History

Tue, 05 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 May 2026 11:45:00 +0000

Type Values Removed Values Added
Description OpenClaw versions 2026.2.23 before 2026.4.12 contain a weakened exec approval binding vulnerability in busybox and toybox applet execution that allows attackers to obscure which applet would actually run. Attackers can exploit opaque multi-call binaries to bypass exec approval mechanisms and weaken risk classification of unsafe applet invocations.
Title OpenClaw 2026.2.23 < 2026.4.12 - Weakened Exec Approval Binding via busybox and toybox Applet Execution
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-05T14:32:40.672Z

Reserved: 2026-05-01T16:56:19.947Z

Link: CVE-2026-43530

cve-icon Vulnrichment

Updated: 2026-05-05T14:31:23.523Z

cve-icon NVD

Status : Received

Published: 2026-05-05T12:16:19.200

Modified: 2026-05-05T12:16:19.200

Link: CVE-2026-43530

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T13:00:07Z

Weaknesses