CVE-2026-28466

OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attackers with valid gateway credentials can inject approval control fields to execute arbitrary commands on connected node hosts, potentially compromising developer workstations and CI runners.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

09 Mar 2026, 15:30

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/0af76f5f0e93540efbdf054895216c398692afcd - () https://github.com/openclaw/openclaw/commit/0af76f5f0e93540efbdf054895216c398692afcd - Patch
References () https://github.com/openclaw/openclaw/commit/318379cdb8d045da0009b0051bd0e712e5c65e2d - () https://github.com/openclaw/openclaw/commit/318379cdb8d045da0009b0051bd0e712e5c65e2d - Broken Link
References () https://github.com/openclaw/openclaw/commit/a7af646fdab124a7536998db6bd6ad567d2b06b0 - () https://github.com/openclaw/openclaw/commit/a7af646fdab124a7536998db6bd6ad567d2b06b0 - Broken Link
References () https://github.com/openclaw/openclaw/commit/c1594627421f95b6bc4ad7c606657dc75b5ad0ce - () https://github.com/openclaw/openclaw/commit/c1594627421f95b6bc4ad7c606657dc75b5ad0ce - Broken Link
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-gv46-4xfq-jv58 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-gv46-4xfq-jv58 - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-node-invoke-approval-bypass - () https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-node-invoke-approval-bypass - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

09 Mar 2026, 13:36

Type Values Removed Values Added
Summary
  • (es) OpenClaw versiones anteriores a 2026.2.14 contienen una vulnerabilidad en el gateway en la que no logra sanear campos de aprobación internos en los parámetros de node.invoke, permitiendo a clientes autenticados eludir el control de aprobación de ejecución para comandos system.run. Atacantes con credenciales de gateway válidas pueden inyectar campos de control de aprobación para ejecutar comandos arbitrarios en hosts de nodo conectados, comprometiendo potencialmente estaciones de trabajo de desarrolladores y CI runners.

06 Mar 2026, 17:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.9

05 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 22:16

Updated : 2026-03-09 15:30


NVD link : CVE-2026-28466

Mitre link : CVE-2026-28466

CVE.ORG link : CVE-2026-28466


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-863

Incorrect Authorization