CVE-2026-32065 PUBLISHED

OpenClaw < 2026.2.25 - Approval Identity Mismatch in system.run Command Execution

Assigner: VulnCheck
Reserved: 10.03.2026 Published: 21.03.2026 Updated: 21.03.2026

OpenClaw versions prior to 2026.2.25 contain an approval-integrity bypass vulnerability in system.run where rendered command text is used as approval identity while trimming argv token whitespace, but runtime execution uses raw argv. An attacker can craft a trailing-space executable token to execute a different binary than what the approver displayed, allowing unexpected command execution under the OpenClaw runtime user when they can influence command argv and reuse an approval context.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.7

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.2.25 (excl.)
  • Version 2026.2.25 is unaffected

Credits

  • tdjackey reporter

References

Problem Types

  • Interpretation Conflict CWE