CVE-2026-32009

MEDIUM

OpenClaw < 2026.2.24 - Binary Hijacking via Static Default Trusted Directories in safeBins

Title source: cna
STIX 2.1

Description

OpenClaw versions prior to 2026.2.24 contain a policy bypass vulnerability in the safeBins allowlist evaluation that trusts static default directories including writable package-manager paths like /opt/homebrew/bin and /usr/local/bin. An attacker with write access to these trusted directories can place a malicious binary with the same name as an allowed executable to achieve arbitrary command execution within the OpenClaw runtime context.

Scores

CVSS v3 5.7
EPSS 0.0002
EPSS Percentile 3.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-426
Status published
Products (3)
npm/openclaw 0 - 2026.2.24npm
OpenClaw/OpenClaw < 2026.2.24
OpenClaw/OpenClaw 2026.2.24
Published Mar 19, 2026
Tracked Since Mar 20, 2026