CVE-2026-32979 PUBLISHED

OpenClaw < 2026.3.11 - Unbound Interpreter and Runtime Commands Bypass in node-host Approval

Assigner: VulnCheck
Reserved: 17.03.2026 Published: 29.03.2026 Updated: 29.03.2026

OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local code by modifying scripts between approval and execution when exact file binding cannot occur. Remote attackers can change approved local scripts before execution to achieve unintended code execution as the OpenClaw runtime user.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 7

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.11 (excl.)
  • Version 2026.3.11 is unaffected

Credits

  • tdjackey reporter

References

Problem Types

  • Time-of-check Time-of-use (TOCTOU) Race Condition CWE