PT-2026-27242 · Openclaw · Openclaw
Tdjackey
·
Published
2026-03-23
·
Updated
2026-03-23
·
CVE-2026-32910
CVSS v3.1
7.3
High
| AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
OpenClaw before 2026.3.1 contains an approval bypass vulnerability in system.run where non-path-like argv[0] tokens fail to bind executable identity, allowing post-approval executable rebind. Attackers can modify PATH resolution after approval to execute a different binary than the operator approved.
Fix
Untrusted Search Path
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw