CVE-2026-32921

OpenClaw before 2026.3.8 contains an approval bypass vulnerability in system.run where mutable script operands are not bound across approval and execution phases. Attackers can obtain approval for script execution, modify the approved script file before execution, and execute different content while maintaining the same approved command shape.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

02 Apr 2026, 14:35

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/c76d29208bf6a7f058d2cf582519d28069e42240 - () https://github.com/openclaw/openclaw/commit/c76d29208bf6a7f058d2cf582519d28069e42240 - Patch
References () https://github.com/openclaw/openclaw/commit/cf3a479bd1204f62eef7dd82b4aa328749ae6c91 - () https://github.com/openclaw/openclaw/commit/cf3a479bd1204f62eef7dd82b4aa328749ae6c91 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-8g75-q649-6pv6 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-8g75-q649-6pv6 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-script-content-modification-via-mutable-operand-binding-in-system-run - () https://www.vulncheck.com/advisories/openclaw-script-content-modification-via-mutable-operand-binding-in-system-run - Third Party Advisory
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

31 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 12:16

Updated : 2026-04-02 14:35


NVD link : CVE-2026-32921

Mitre link : CVE-2026-32921

CVE.ORG link : CVE-2026-32921


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition