CVE-2026-32023

HIGH

OpenClaw < 2026.2.24 - Approval Gating Bypass via Dispatch-Wrapper Depth-Cap Mismatch in system.run

Title source: cna
STIX 2.1

Description

OpenClaw versions prior to 2026.2.24 contain an approval gating bypass vulnerability in system.run allowlist mode where nested transparent dispatch wrappers can suppress shell-wrapper detection. Attackers can exploit this by chaining multiple dispatch wrappers like /usr/bin/env to execute /bin/sh -c commands without triggering the expected approval prompt in allowlist plus ask=on-miss configurations.

Scores

CVSS v3 7.1
EPSS 0.0005
EPSS Percentile 15.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-863
Status published
Products (4)
npm/openclaw 0 - 2026.2.24npm
OpenClaw/OpenClaw < 2026.2.24
openclaw/openclaw < 2026.2.24
OpenClaw/OpenClaw 2026.2.24
Published Mar 19, 2026
Tracked Since Mar 20, 2026