Home

Description

OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run node-host execution where argv rewriting changes command semantics. Attackers can place malicious local scripts in the working directory to execute unintended code despite operator approval of different command text.

PUBLISHED Reserved 2026-03-04 | Published 2026-03-19 | Updated 2026-03-19 | Assigner VulnCheck




MEDIUM: 5.4CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

MEDIUM: 6.7CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-88 Argument Injection or Modification

Product status

Default status
unaffected

2026.3.1 (semver) before 2026.3.2
affected

Credits

tdjackey reporter

References

github.com/...enclaw/security/advisories/GHSA-h3rm-6x7g-882f (GitHub Security Advisory (GHSA-h3rm-6x7g-882f)) third-party-advisory

github.com/...ommit/dded569626b0d8e7bdab10b5e7528b6caf73a0f1 (Patch Commit) patch

www.vulncheck.com/...ty-bypass-via-system-run-argv-rewriting (VulnCheck Advisory: OpenClaw 2026.3.1 < 2026.3.2 - Approval Integrity Bypass via system.run argv Rewriting) third-party-advisory

cve.org (CVE-2026-29608)

nvd.nist.gov (CVE-2026-29608)

Download JSON