Description
OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run node-host execution where argv rewriting changes command semantics. Attackers can place malicious local scripts in the working directory to execute unintended code despite operator approval of different command text.
Problem types
CWE-88 Argument Injection or Modification
Product status
2026.3.1 (semver) before 2026.3.2
Credits
tdjackey
References
github.com/...enclaw/security/advisories/GHSA-h3rm-6x7g-882f (GitHub Security Advisory (GHSA-h3rm-6x7g-882f))
github.com/...ommit/dded569626b0d8e7bdab10b5e7528b6caf73a0f1 (Patch Commit)
www.vulncheck.com/...ty-bypass-via-system-run-argv-rewriting (VulnCheck Advisory: OpenClaw 2026.3.1 < 2026.3.2 - Approval Integrity Bypass via system.run argv Rewriting)