OpenClaw before 2026.4.2 contains an approval integrity vulnerability in pnpm dlx that fails to bind local script operands consistently with pnpm exec flows. Attackers can replace approved local scripts before execution without invalidating the approval plan, allowing execution of modified script contents.
References
Configurations
History
01 May 2026, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/176c059b05357df1bc09d4328a2380670859eeff - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-w6wx-jq6j-6mcj - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-approval-integrity-bypass-in-pnpm-dlx-local-script-binding - Third Party Advisory |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-05-01 20:24
NVD link : CVE-2026-41360
Mitre link : CVE-2026-41360
CVE.ORG link : CVE-2026-41360
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
