


Perceptive Security
SOC/SIEM Consultancy

OpenClaw versions prior to 2026.2.23 contain an exec approval bypass vulnerability in allowlist mode where allow-always grants could be circumvented through unr…
Published:
17 March 2026 at 23:00:00
Alert date:
18 March 2026 at 16:03:59
Source:
nvd.nist.gov
Security Tools
OpenClaw versions prior to 2026.2.23 contain an execution approval bypass vulnerability in allowlist mode. The vulnerability allows attackers to circumvent allow-always grants through unrecognized multiplexer shell wrappers like busybox and toybox sh -c commands. Attackers can exploit this by invoking arbitrary payloads under the same multiplexer wrapper to satisfy stored allowlist rules. This effectively bypasses intended execution restrictions in the security control mechanism. The vulnerability represents a significant security control bypass that could lead to unauthorized code execution.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-22175
https://github.com/openclaw/openclaw/commit/a67689a7e3ad494b6637c76235a664322d526f9e
https://github.com/openclaw/openclaw/security/advisories/GHSA-gwqp-86q6-w47g
https://www.vulncheck.com/advisories/openclaw-exec-approval-bypass-via-unrecognized-multiplexer-shell-wrappers
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
