PT-2026-26396 · Openclaw · Openclaw
Adnan Jakati
·
Published
2026-03-19
·
Updated
2026-03-19
·
CVE-2026-32015
CVSS v3.1
7.0
High
| AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a path hijacking vulnerability in tools.exec.safeBins that allows attackers to bypass allowlist checks by controlling process PATH resolution. Attackers who can influence the gateway process PATH or launch environment can execute trojan binaries with allowlisted names, such as jq, circumventing executable validation controls.
Fix
Untrusted Search Path
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw