Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.9

OpenClaw, versions before 2026.2.25: Malicious File Execution Risk

CVE-2026-32043
Summary

OpenClaw users are at risk of executing malicious files on their systems if an attacker manipulates a symbolic link. This can happen if a user approves a job with a validated path, but the actual path is changed before the job is executed. To protect your system, update to version 2026.2.25 or later.

Original title
OpenClaw versions prior to 2026.2.25 contain a time-of-check-time-of-use vulnerability in approval-bound system.run execution where the cwd parameter is validated at approval time but resolved at e...
Original description
OpenClaw versions prior to 2026.2.25 contain a time-of-check-time-of-use vulnerability in approval-bound system.run execution where the cwd parameter is validated at approval time but resolved at execution time. Attackers can retarget a symlinked cwd between approval and execution to bypass command execution restrictions and execute arbitrary commands on node hosts.
nvd CVSS3.1 6.5
nvd CVSS4.0 5.9
Vulnerability type
CWE-367
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026