Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.5
OpenClaw: safeBins static default trusted dirs allow writable-dir binary hijack (`jq`)
GHSA-5gj7-jf77-q2q2
Summary
### Summary
In `openclaw<=2026.2.23`, safe-bin trust in allowlist mode relied on static default trusted directories that included package-manager paths (notably `/opt/homebrew/bin` and `/usr/local/bin`).
When a same-name binary (for example `jq`) is placed in one of those trusted default directories...
What to do
- Update openclaw to version 2026.2.24.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | openclaw | <= 2026.2.23 | 2026.2.24 |
Original title
OpenClaw: safeBins static default trusted dirs allow writable-dir binary hijack (`jq`)
Original description
### Summary
In `openclaw<=2026.2.23`, safe-bin trust in allowlist mode relied on static default trusted directories that included package-manager paths (notably `/opt/homebrew/bin` and `/usr/local/bin`).
When a same-name binary (for example `jq`) is placed in one of those trusted default directories, safe-bin evaluation can be satisfied and execute the attacker-controlled binary.
### Impact
This is an exec allowlist `safeBins` policy bypass that can lead to command execution in the OpenClaw runtime context.
Severity is set to Medium given the required ability to write into trusted host binary directories.
### Affected Packages / Versions
- Package: `openclaw` (npm)
- Vulnerable versions: `<= 2026.2.23`
- Patched versions: `>= 2026.2.24` (planned next npm release)
- Latest published npm version at triage time (2026-02-24): `2026.2.23`
### Root Cause
- Default safe-bin trusted directories included package-manager/user-managed paths.
- Trust decision was directory-membership only for resolved executable paths.
### Remediation
- Restrict default safe-bin trusted directories to immutable system paths: `/bin`, `/usr/bin`.
- Require explicit operator opt-in for package-manager/user paths via `tools.exec.safeBinTrustedDirs`.
### Fix Commit(s)
- `b67e600bff696ff2ed9b470826590c0ce6b3bb0a`
### Release Process Note
`patched_versions` is pre-set to the planned next release (`2026.2.24`).
Once npm release `2026.2.24` is published, this advisory should be ready for publish without additional version edits.
OpenClaw thanks @tdjackey for reporting.
### Publication Update (2026-02-25)
`[email protected]` is published on npm and contains the fix commit(s) listed above. This advisory now marks `>= 2026.2.24` as patched.
In `openclaw<=2026.2.23`, safe-bin trust in allowlist mode relied on static default trusted directories that included package-manager paths (notably `/opt/homebrew/bin` and `/usr/local/bin`).
When a same-name binary (for example `jq`) is placed in one of those trusted default directories, safe-bin evaluation can be satisfied and execute the attacker-controlled binary.
### Impact
This is an exec allowlist `safeBins` policy bypass that can lead to command execution in the OpenClaw runtime context.
Severity is set to Medium given the required ability to write into trusted host binary directories.
### Affected Packages / Versions
- Package: `openclaw` (npm)
- Vulnerable versions: `<= 2026.2.23`
- Patched versions: `>= 2026.2.24` (planned next npm release)
- Latest published npm version at triage time (2026-02-24): `2026.2.23`
### Root Cause
- Default safe-bin trusted directories included package-manager/user-managed paths.
- Trust decision was directory-membership only for resolved executable paths.
### Remediation
- Restrict default safe-bin trusted directories to immutable system paths: `/bin`, `/usr/bin`.
- Require explicit operator opt-in for package-manager/user paths via `tools.exec.safeBinTrustedDirs`.
### Fix Commit(s)
- `b67e600bff696ff2ed9b470826590c0ce6b3bb0a`
### Release Process Note
`patched_versions` is pre-set to the planned next release (`2026.2.24`).
Once npm release `2026.2.24` is published, this advisory should be ready for publish without additional version edits.
OpenClaw thanks @tdjackey for reporting.
### Publication Update (2026-02-25)
`[email protected]` is published on npm and contains the fix commit(s) listed above. This advisory now marks `>= 2026.2.24` as patched.
ghsa CVSS4.0
8.5
Vulnerability type
CWE-428
CWE-829
Published: 3 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026