CVE-2026-32978

OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute modified code under the approved run context.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

30 Mar 2026, 17:15

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-qc36-x95h-7j53 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-qc36-x95h-7j53 - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-unrecognized-script-runners - () https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-unrecognized-script-runners - Third Party Advisory
First Time Openclaw openclaw
Openclaw

29 Mar 2026, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-29 13:17

Updated : 2026-03-30 17:15


NVD link : CVE-2026-32978

Mitre link : CVE-2026-32978

CVE.ORG link : CVE-2026-32978


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-863

Incorrect Authorization