High severityNVD Advisory· Published Mar 29, 2026· Updated Mar 30, 2026
OpenClaw < 2026.3.11 - Approval Bypass via Unrecognized Script Runners
CVE-2026-32978
Description
OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute modified code under the approved run context.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openclawnpm | < 2026.3.11 | 2026.3.11 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-qc36-x95h-7j53ghsaADVISORY
- github.com/openclaw/openclaw/security/advisories/GHSA-qc36-x95h-7j53ghsathird-party-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-32978ghsaADVISORY
- www.vulncheck.com/advisories/openclaw-approval-bypass-via-unrecognized-script-runnersghsathird-party-advisoryWEB
- github.com/openclaw/openclaw/releases/tag/v2026.3.11ghsaWEB
News mentions
0No linked articles in our index yet.