Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
2.0

OpenClaw versions prior to 2026.2.26: Approval Bypass via Reused Requests

CVE-2026-32058
Summary

Old versions of OpenClaw have a security weakness that lets attackers use previously approved requests with new environment settings, bypassing security checks. This can happen if an attacker gets hold of an approval ID. To fix this, update to OpenClaw version 2026.2.26 or later.

Original title
OpenClaw versions prior to 2026.2.26 contain an approval context-binding weakness in system.run execution flows with host=node that allows reuse of previously approved requests with modified enviro...
Original description
OpenClaw versions prior to 2026.2.26 contain an approval context-binding weakness in system.run execution flows with host=node that allows reuse of previously approved requests with modified environment variables. Attackers with access to an approval id can exploit this by reusing an approval with changed env input, bypassing execution-integrity controls in approval-enabled workflows.
nvd CVSS3.1 2.6
nvd CVSS4.0 2.0
Vulnerability type
CWE-863 Incorrect Authorization
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026