Home

Description

OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows allow-always persistence to trust wrapper carrier executables instead of invoked targets. Attackers can exploit positional carrier executable routing through dispatch wrappers to establish broader allowlist entries than intended, weakening execution approval boundaries.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-28 | Updated 2026-04-29 | Assigner VulnCheck




HIGH: 7.0CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-807 Reliance on Untrusted Inputs in a Security Decision

Product status

Default status
unaffected

Any version before 2026.3.28
affected

2026.3.28 (semver)
unaffected

Credits

Nathan (@nexrin) reporter

KeenSecurityLab finder

qclawer finder

References

github.com/...enclaw/security/advisories/GHSA-p4x4-2r7f-wjxg (GitHub Security Advisory (GHSA-p4x4-2r7f-wjxg)) vendor-advisory

www.vulncheck.com/...lowlist-via-wrapper-carrier-executables (VulnCheck Advisory: OpenClaw < 2026.3.28 - Arbitrary Execution Allowlist via Wrapper Carrier Executables) third-party-advisory

cve.org (CVE-2026-41380)

nvd.nist.gov (CVE-2026-41380)

Download JSON