


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and …
Published:
28 March 2026 at 23:00:00
Alert date:
29 March 2026 at 14:05:44
Source:
nvd.nist.gov
Security Tools, Operating Systems
OpenClaw versions before 2026.3.11 contain a critical exec allowlist bypass vulnerability in the matchesExecAllowlistPattern function. The vulnerability stems from improper pattern normalization using lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard character to match across path segments, allowing execution of commands or paths not intended by system operators. This represents a significant security bypass that could lead to unauthorized command execution. The vulnerability affects the security controls designed to restrict executable paths and commands.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-32973
https://github.com/openclaw/openclaw/security/advisories/GHSA-f8r2-vg7x-gh8m
https://www.vulncheck.com/advisories/openclaw-exec-allowlist-pattern-overmatch-via-posix-path-normalization
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
