Home

Description

OpenClaw versions prior to 2026.2.26 contain an approval bypass vulnerability in system.run execution that allows attackers to execute commands from unintended filesystem locations by rebinding writable parent symlinks in the current working directory after approval. An attacker can modify mutable parent symlink path components between approval and execution time to redirect command execution to a different location while preserving the visible working directory string.

PUBLISHED Reserved 2026-02-20 | Published 2026-03-18 | Updated 2026-03-18 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N

MEDIUM: 6.1CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

Problem types

CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition

Product status

Default status
unaffected

Any version before 2026.2.26
affected

Credits

tdjackey reporter

References

github.com/...enclaw/security/advisories/GHSA-f7ww-2725-qvw2 (GitHub Security Advisory (GHSA-f7ww-2725-qvw2)) third-party-advisory

github.com/...ommit/78a7ff2d50fb3bcef351571cb5a0f21430a340c1 (Patch Commit #1) patch

github.com/...ommit/d82c042b09727a6148f3ca651b254c4a677aff26 (Patch Commit #2) patch

github.com/...ommit/d06632ba45a8482192792c55d5ff0b2e21abb0a7 (Patch Commit #3) patch

github.com/...ommit/4e690e09c746408b5e27617a20cb3fdc5190dbda (Patch Commit #4) patch

github.com/...ommit/4b4718c8dfce2e2c48404aa5088af7c013bed60b (Patch Commit #5) patch

www.vulncheck.com/...ymlink-current-working-directory-rebind (VulnCheck Advisory: OpenClaw < 2026.2.26 - Approval Bypass via Parent Symlink Current Working Directory Rebind) third-party-advisory

cve.org (CVE-2026-27545)

nvd.nist.gov (CVE-2026-27545)

Download JSON