Description
OpenClaw before 2026.4.2 contains an approval integrity vulnerability in pnpm dlx that fails to bind local script operands consistently with pnpm exec flows. Attackers can replace approved local scripts before execution without invalidating the approval plan, allowing execution of modified script contents.
Problem types
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
Product status
Any version before 2026.4.2
2026.4.2 (semver)
Credits
风间映川 (@Kazamayc)
References
github.com/...enclaw/security/advisories/GHSA-w6wx-jq6j-6mcj (GitHub Security Advisory (GHSA-w6wx-jq6j-6mcj))
github.com/...ommit/176c059b05357df1bc09d4328a2380670859eeff (Patch Commit)
www.vulncheck.com/...bypass-in-pnpm-dlx-local-script-binding (VulnCheck Advisory: OpenClaw < 2026.4.2 - Approval Integrity Bypass in pnpm dlx Local Script Binding)