CVE-2026-29608

OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run node-host execution where argv rewriting changes command semantics. Attackers can place malicious local scripts in the working directory to execute unintended code despite operator approval of different command text.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:2026.3.1:*:*:*:*:node.js:*:*

History

19 Mar 2026, 19:15

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:2026.3.1:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/dded569626b0d8e7bdab10b5e7528b6caf73a0f1 - () https://github.com/openclaw/openclaw/commit/dded569626b0d8e7bdab10b5e7528b6caf73a0f1 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-h3rm-6x7g-882f - () https://github.com/openclaw/openclaw/security/advisories/GHSA-h3rm-6x7g-882f - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-approval-integrity-bypass-via-system-run-argv-rewriting - () https://www.vulncheck.com/advisories/openclaw-approval-integrity-bypass-via-system-run-argv-rewriting - Third Party Advisory

19 Mar 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 02:16

Updated : 2026-03-19 19:15


NVD link : CVE-2026-29608

Mitre link : CVE-2026-29608

CVE.ORG link : CVE-2026-29608


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')