top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and …

Published:

28 March 2026 at 23:00:00

Alert date:

29 March 2026 at 14:05:44

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools, Operating Systems

OpenClaw versions before 2026.3.11 contain a critical exec allowlist bypass vulnerability in the matchesExecAllowlistPattern function. The vulnerability stems from improper pattern normalization using lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard character to match across path segments, allowing execution of commands or paths not intended by system operators. This represents a significant security bypass that could lead to unauthorized command execution. The vulnerability affects the security controls designed to restrict executable paths and commands.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page