OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between `rawCommand` and `command[]` in the node host `system.run` handler could cause allowlist/approval evaluation to be performed on one command while executing a different argv. This only impacts deployments that use the node host / companion node execution path (`system.run` on a node), enable allowlist-based exec policy (`security=allowlist`) with approval prompting driven by allowlist misses (for example `ask=on-miss`), allow an attacker to invoke `system.run`. Default/non-node configurations are not affected. Version 2026.2.14 enforces `rawCommand`/`command[]` consistency (gateway fail-fast + node host validation).
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/cb3290fca32593956638f161d9776266b90ab891 | Patch |
| https://github.com/openclaw/openclaw/releases/tag/v2026.2.14 | Product Release Notes |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-h3f9-mjwj-w476 | Patch Vendor Advisory |
Configurations
History
23 Feb 2026, 13:47
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| Summary |
|
|
| References | () https://github.com/openclaw/openclaw/commit/cb3290fca32593956638f161d9776266b90ab891 - Patch | |
| References | () https://github.com/openclaw/openclaw/releases/tag/v2026.2.14 - Product, Release Notes | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-h3f9-mjwj-w476 - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
19 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 23:16
Updated : 2026-02-23 13:47
NVD link : CVE-2026-26325
Mitre link : CVE-2026-26325
CVE.ORG link : CVE-2026-26325
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-284
Improper Access Control
