Description
OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows allow-always persistence to trust wrapper carrier executables instead of invoked targets. Attackers can exploit positional carrier executable routing through dispatch wrappers to establish broader allowlist entries than intended, weakening execution approval boundaries.
Problem types
CWE-807 Reliance on Untrusted Inputs in a Security Decision
Product status
Any version before 2026.3.28
2026.3.28 (semver)
Credits
Nathan (@nexrin)
KeenSecurityLab
qclawer
References
github.com/...enclaw/security/advisories/GHSA-p4x4-2r7f-wjxg (GitHub Security Advisory (GHSA-p4x4-2r7f-wjxg))
www.vulncheck.com/...lowlist-via-wrapper-carrier-executables (VulnCheck Advisory: OpenClaw < 2026.3.28 - Arbitrary Execution Allowlist via Wrapper Carrier Executables)