Home

Description

OpenClaw before 2026.3.28 contains an exec allowlist bypass vulnerability where allow-always persistence fails to unwrap /usr/bin/script and similar wrappers before storing trust decisions. Attackers can obtain user approval for one wrapped command to persist trust for wrapper binaries that execute different underlying programs.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-28 | Updated 2026-04-28 | Assigner VulnCheck




HIGH: 7.0CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-807 Reliance on Untrusted Inputs in a Security Decision

Product status

Default status
unaffected

Any version before 2026.3.28
affected

2026.3.28 (semver)
unaffected

Credits

LonggTeng reporter

References

github.com/...enclaw/security/advisories/GHSA-6pfc-6m7w-m8fx (GitHub Security Advisory (GHSA-6pfc-6m7w-m8fx)) vendor-advisory

www.vulncheck.com/...via-unregistered-usr-bin-script-wrapper (VulnCheck Advisory: OpenClaw < 2026.3.28 - Exec Allowlist Bypass via Unregistered /usr/bin/script Wrapper) third-party-advisory

cve.org (CVE-2026-41390)

nvd.nist.gov (CVE-2026-41390)

Download JSON