CVE-2026-31993

OpenClaw versions prior to 2026.2.22 contain an allowlist parsing mismatch vulnerability in the macOS companion app that allows authenticated operators to bypass exec approval checks. Attackers with operator.write privileges and a paired macOS beta node can craft shell-chain payloads that pass incomplete allowlist validation and execute arbitrary commands on the paired host.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

19 Mar 2026, 18:50

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/5da03e622119fa012285cdb590fcf4264c965cb5 - () https://github.com/openclaw/openclaw/commit/5da03e622119fa012285cdb590fcf4264c965cb5 - Patch
References () https://github.com/openclaw/openclaw/commit/e371da38aab99521c4e076cd3d95fd775e00b784 - () https://github.com/openclaw/openclaw/commit/e371da38aab99521c4e076cd3d95fd775e00b784 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-5f9p-f3w2-fwch - () https://github.com/openclaw/openclaw/security/advisories/GHSA-5f9p-f3w2-fwch - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-allowlist-parsing-mismatch-in-system-run-shell-chains - () https://www.vulncheck.com/advisories/openclaw-allowlist-parsing-mismatch-in-system-run-shell-chains - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

19 Mar 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 02:16

Updated : 2026-03-19 18:50


NVD link : CVE-2026-31993

Mitre link : CVE-2026-31993

CVE.ORG link : CVE-2026-31993


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-184

Incomplete List of Disallowed Inputs