Description
OpenClaw versions 2026.2.23 before 2026.4.12 contain a weakened exec approval binding vulnerability in busybox and toybox applet execution that allows attackers to obscure which applet would actually run. Attackers can exploit opaque multi-call binaries to bypass exec approval mechanisms and weaken risk classification of unsafe applet invocations.
Problem types
CWE-863: Incorrect Authorization
Product status
2026.2.23 (semver) before 2026.4.12
2026.4.12 (semver)
Credits
nullPointerExcepTed (@decsecre583)
References
github.com/...enclaw/security/advisories/GHSA-2cq5-mf3v-mx44 (GitHub Security Advisory (GHSA-2cq5-mf3v-mx44))
github.com/...ommit/666f48d9b882a8a1415ca53f9567c72499d850c9 (Patch Commit)
www.vulncheck.com/...via-busybox-and-toybox-applet-execution (VulnCheck Advisory: OpenClaw 2026.2.23 < 2026.4.12 - Weakened Exec Approval Binding via busybox and toybox Applet Execution)