Untriaged
Permalink
CVE-2026-32978
8.0 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
OpenClaw < 2026.3.11 - Approval Bypass via Unrecognized Script Runners
OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute modified code under the approved run context.
References
-
GitHub Security Advisory (GHSA-qc36-x95h-7j53) third-party-advisory
Affected products
OpenClaw
- <2026.3.11
- ==2026.3.11
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>