OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows allow-always persistence to trust wrapper carrier executables instead of invoked targets. Attackers can exploit positional carrier executable routing through dispatch wrappers to establish broader allowlist entries than intended, weakening execution approval boundaries.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows allow-always persistence to trust wrapper carrier executables instead of invoked targets. Attackers can exploit positional carrier executable routing through dispatch wrappers to establish broader allowlist entries than intended, weakening execution approval boundaries. | |
| Title | OpenClaw < 2026.3.28 - Arbitrary Execution Allowlist via Wrapper Carrier Executables | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-807 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-28T18:09:43.488Z
Reserved: 2026-04-20T14:12:09.519Z
Link: CVE-2026-41380
No data.
Status : Awaiting Analysis
Published: 2026-04-28T19:37:40.957
Modified: 2026-04-28T20:10:23.367
Link: CVE-2026-41380
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:15:43Z