OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run node-host execution where argv rewriting changes command semantics. Attackers can place malicious local scripts in the working directory to execute unintended code despite operator approval of different command text.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openclaw:openclaw:2026.3.1:*:*:*:*:node.js:*:* |
Thu, 19 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run node-host execution where argv rewriting changes command semantics. Attackers can place malicious local scripts in the working directory to execute unintended code despite operator approval of different command text. | |
| Title | OpenClaw 2026.3.1 < 2026.3.2 - Approval Integrity Bypass via system.run argv Rewriting | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-88 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-19T01:00:48.321Z
Updated: 2026-03-19T16:09:41.951Z
Reserved: 2026-03-04T16:16:15.967Z
Link: CVE-2026-29608
Updated: 2026-03-19T16:09:38.040Z
Status : Analyzed
Published: 2026-03-19T02:16:03.223
Modified: 2026-03-19T19:15:57.043
Link: CVE-2026-29608
No data.
ReportizFlow