Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.3

OpenClaw: Unauthentic Code Execution via Node-Host Approval

GHSA-xf99-j42q-5w5p
Summary

Some OpenClaw deployments using a specific approval mode could execute different, potentially malicious, code than what was initially approved. This is fixed in version 2026.3.11. Upgrade to this version to ensure secure execution.

What to do
  • Update openclaw to version 2026.3.11.
Affected software
VendorProductAffected versionsFix available
– openclaw <= 2026.3.11 2026.3.11
Original title
OpenClaw: Unbound interpreter and runtime commands could bypass node-host approval integrity
Original description
## Summary
In affected versions of `openclaw`, node-host `system.run` approvals could still execute rewritten local code for interpreter and runtime commands when OpenClaw could not bind exactly one concrete local file operand during approval planning.

## Impact
Deployments using node-host `system.run` approval mode could approve a benign local script and then execute different local code if that script changed before execution. This can lead to unintended local code execution as the OpenClaw runtime user.

## Affected Packages and Versions
- Package: `openclaw` (npm)
- Affected versions: `<= 2026.3.8`
- Fixed in: `2026.3.11`

## Technical Details
The approval flow treated some interpreter and runtime forms as approval-backed even when it could not honestly bind a single direct local script file. That left residual approval-integrity gaps for runtime forms outside the directly bound file set.

## Fix
OpenClaw now fails closed for approval-backed interpreter and runtime commands unless it can bind exactly one concrete local file operand, and it extends best-effort direct-file binding for additional runtime forms. The fix shipped in `[email protected]`.

## Workarounds
Upgrade to `2026.3.11` or later.
ghsa CVSS3.1 7.3
Vulnerability type
CWE-367
Published: 13 Mar 2026 · Updated: 14 Mar 2026 · First seen: 13 Mar 2026