top of page
perceptive_background_267k.jpg

OpenClaw versions prior to 2026.2.23 contain an exec approval bypass vulnerability in allowlist mode where allow-always grants could be circumvented through unr…

Published:

17 March 2026 at 23:00:00

Alert date:

18 March 2026 at 16:03:59

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

OpenClaw versions prior to 2026.2.23 contain an execution approval bypass vulnerability in allowlist mode. The vulnerability allows attackers to circumvent allow-always grants through unrecognized multiplexer shell wrappers like busybox and toybox sh -c commands. Attackers can exploit this by invoking arbitrary payloads under the same multiplexer wrapper to satisfy stored allowlist rules. This effectively bypasses intended execution restrictions in the security control mechanism. The vulnerability represents a significant security control bypass that could lead to unauthorized code execution.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page