top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local code by modifying scripts between approval …

Published:

28 maart 2026 om 23:00:00

Alert date:

29 maart 2026 om 14:05:44

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

OpenClaw versions before 2026.3.11 contain an approval integrity vulnerability that allows attackers to execute rewritten local code. The vulnerability occurs when exact file binding cannot occur, enabling attackers to modify scripts between approval and execution. Remote attackers can change approved local scripts before execution to achieve unintended code execution as the OpenClaw runtime user. This represents a significant security flaw in the approval process that can lead to unauthorized code execution.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page