Description
OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that should require explicit user approval, circumventing the intended security boundary.
Problem types
CWE-636: Not Failing Securely (Failing Open)
Product status
Any version before 2026.4.8
2026.4.8 (semver)
Credits
zsx (@zsxsoft)
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-q2gc-xjqw-qp89 (GitHub Security Advisory (GHSA-q2gc-xjqw-qp89))
github.com/...ommit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 (Patch Commit)
www.vulncheck.com/...ry-bypass-via-approval-timeout-fallback (VulnCheck Advisory: OpenClaw < 2026.4.8 - strictInlineEval Approval Boundary Bypass via Approval-Timeout Fallback)