Policy Bypass Vulnerability in OpenClaw Affects Arbitrary Command Execution
CVE-2026-32009

7HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
19 March 2026

What is CVE-2026-32009?

OpenClaw versions prior to 2026.2.24 are susceptible to a policy bypass vulnerability resulting from the safeBins allowlist evaluation system. This vulnerability inherently trusts static default directories, including writable paths from package managers such as /opt/homebrew/bin and /usr/local/bin. Attackers with write permissions in these trusted directories can exploit this flaw by placing a malicious binary named identically to an allowed executable. This can lead to arbitrary command execution within the OpenClaw runtime environment, posing significant security risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

OpenClaw 0 < 2026.2.24

OpenClaw 2026.2.24

References

CVSS V4

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

tdjackey
.