Approval-Integrity Bypass in OpenClaw by OpenClaw
CVE-2026-32065

5.7MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
21 March 2026

What is CVE-2026-32065?

A vulnerability exists in OpenClaw versions prior to 2026.2.25 that allows an attacker to bypass the approval integrity mechanism in the system.run command. This occurs when crafted executable tokens with trailing whitespace are used. The displayed command text does not match the raw argv during execution, enabling the attacker to run a different binary than intended. If an attacker can influence the command arguments and reuse an approval context, they can execute unauthorized commands under the OpenClaw runtime user.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

OpenClaw 0 < 2026.2.25

OpenClaw 2026.2.25

References

CVSS V4

Score:
5.7
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

tdjackey
.