CVE-2026-27183

OpenClaw versions prior to 2026.3.7 contain a shell approval gating bypass vulnerability in system.run dispatch-wrapper handling that allows attackers to skip shell wrapper approval requirements. The approval classifier and execution planner apply different depth-boundary rules, permitting exactly four transparent dispatch wrappers like repeated env invocations before /bin/sh -c to bypass security=allowlist approval gating by misaligning classification with execution planning.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

25 Mar 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.5
v2 : unknown
v3 : 5.3

24 Mar 2026, 21:25

Type Values Removed Values Added
Summary
  • (es) Versiones de OpenClaw anteriores a 2026.3.7 contienen una vulnerabilidad de omisión de la aprobación de la compuerta de shell en el manejo del envoltorio de despacho de system.run que permite a los atacantes omitir los requisitos de aprobación del envoltorio de shell. El clasificador de aprobación y el planificador de ejecución aplican reglas de límite de profundidad diferentes, permitiendo exactamente cuatro envoltorios de despacho transparentes como invocaciones repetidas de 'env' antes de /bin/sh -c para omitir la aprobación de la compuerta de 'allowlist' de seguridad al desalinear la clasificación con la planificación de la ejecución.
References () https://github.com/openclaw/openclaw/commit/2fc95a7cfc1eb9306356510b0251b6d51fb1c0b0 - () https://github.com/openclaw/openclaw/commit/2fc95a7cfc1eb9306356510b0251b6d51fb1c0b0 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-r6qf-8968-wj9q - () https://github.com/openclaw/openclaw/security/advisories/GHSA-r6qf-8968-wj9q - Vendor Advisory
References () https://vulncheck.com/advisories/openclaw-mar-shell-approval-gating-bypass-via-dispatch-wrapper-depth-mismatch - () https://vulncheck.com/advisories/openclaw-mar-shell-approval-gating-bypass-via-dispatch-wrapper-depth-mismatch - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

23 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-23 22:16

Updated : 2026-03-25 15:16


NVD link : CVE-2026-27183

Mitre link : CVE-2026-27183

CVE.ORG link : CVE-2026-27183


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-863

Incorrect Authorization