๐Ÿ” CVE Alert

CVE-2026-32058

LOW 2.6

OpenClaw < 2026.2.26 - Approval Context-Binding Weakness in system.run via host=node

CVSS Score
2.6
EPSS Score
0.0%
EPSS Percentile
0th

OpenClaw versions prior to 2026.2.26 contain an approval context-binding weakness in system.run execution flows with host=node that allows reuse of previously approved requests with modified environment variables. Attackers with access to an approval id can exploit this by reusing an approval with changed env input, bypassing execution-integrity controls in approval-enabled workflows.

CWE CWE-863
Vendor openclaw
Product openclaw
Published Mar 21, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new low vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Affected Versions

OpenClaw / OpenClaw
0 < 2026.2.26

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-hjvp-qhm6-wrh2 github.com: https://github.com/openclaw/openclaw/commit/10481097f8e6dd0346db9be0b5f27570e1bdfcfa vulncheck.com: https://www.vulncheck.com/advisories/openclaw-approval-context-binding-weakness-in-system-run-via-host-node

Credits

๐Ÿ” tdjackey