Approval Timeout Bypass Vulnerability in OpenClaw Product by OpenClaw
CVE-2026-42423

7.7HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-42423?

OpenClaw prior to version 2026.4.8 contains a flaw in its approval-timeout fallback mechanism that allows attackers to bypass the strictInlineEval explicit approval requirement. This vulnerability enables unauthorized execution of inline eval commands on gateway and node execution hosts, circumventing intended security measures designed to protect user data and system integrity.

Affected Version(s)

OpenClaw 0 < 2026.4.8

OpenClaw 2026.4.8

References

CVSS V4

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
.