CVE-2026-32016

OpenClaw versions prior to 2026.2.22 on macOS contain a path validation bypass vulnerability in the exec-approval allowlist mode that allows local attackers to execute unauthorized binaries by exploiting basename-only allowlist entries. Attackers can execute same-name local binaries ./echo without approval when security=allowlist and ask=on-miss are configured, bypassing intended path-based policy restrictions.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

History

25 Mar 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.0
v2 : unknown
v3 : 7.8

24 Mar 2026, 21:22

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/dd41fadcaf58fd9deb963d6e163c56161e7b35dd - () https://github.com/openclaw/openclaw/commit/dd41fadcaf58fd9deb963d6e163c56161e7b35dd - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-7f4q-9rqh-x36p - () https://github.com/openclaw/openclaw/security/advisories/GHSA-7f4q-9rqh-x36p - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-path-traversal-via-basename-only-allowlist-matching-on-macos - () https://www.vulncheck.com/advisories/openclaw-path-traversal-via-basename-only-allowlist-matching-on-macos - Third Party Advisory
First Time Openclaw openclaw
Apple macos
Apple
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
Summary
  • (es) Versiones de OpenClaw anteriores a la 2026.2.22 en macOS contienen una vulnerabilidad de omisión de validación de ruta en el modo de lista de permitidos de aprobación de ejecución que permite a atacantes locales ejecutar binarios no autorizados explotando entradas de lista de permitidos solo por nombre base. Los atacantes pueden ejecutar binarios locales con el mismo nombre ./echo sin aprobación cuando security=allowlist y ask=on-miss están configurados, omitiendo las restricciones de política basadas en ruta previstas.

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-25 15:16


NVD link : CVE-2026-32016

Mitre link : CVE-2026-32016

CVE.ORG link : CVE-2026-32016


JSON object : View

Products Affected

openclaw

  • openclaw

apple

  • macos
CWE
CWE-426

Untrusted Search Path