OpenClaw versions prior to 2026.2.22 contain an allowlist parsing mismatch vulnerability in the macOS companion app that allows authenticated operators to bypass exec approval checks. Attackers with operator.write privileges and a paired macOS beta node can craft shell-chain payloads that pass incomplete allowlist validation and execute arbitrary commands on the paired host.
References
Configurations
History
19 Mar 2026, 18:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/5da03e622119fa012285cdb590fcf4264c965cb5 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/e371da38aab99521c4e076cd3d95fd775e00b784 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-5f9p-f3w2-fwch - Mitigation, Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-allowlist-parsing-mismatch-in-system-run-shell-chains - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
19 Mar 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 02:16
Updated : 2026-03-19 18:50
NVD link : CVE-2026-31993
Mitre link : CVE-2026-31993
CVE.ORG link : CVE-2026-31993
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-184
Incomplete List of Disallowed Inputs
