


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local code by modifying scripts between approval …
Published:
28 March 2026 at 23:00:00
Alert date:
29 March 2026 at 14:05:44
Source:
nvd.nist.gov
Security Tools
OpenClaw versions before 2026.3.11 contain an approval integrity vulnerability that allows attackers to execute rewritten local code. The vulnerability occurs when exact file binding cannot occur, enabling attackers to modify scripts between approval and execution. Remote attackers can change approved local scripts before execution to achieve unintended code execution as the OpenClaw runtime user. This represents a significant security flaw in the approval process that can lead to unauthorized code execution.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-32979
https://github.com/openclaw/openclaw/security/advisories/GHSA-xf99-j42q-5w5p
https://www.vulncheck.com/advisories/openclaw-unbound-interpreter-and-runtime-commands-bypass-in-node-host-approval
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
