Vulnerability Description
OpenClaw before 2026.3.8 contains an approval bypass vulnerability in system.run where mutable script operands are not bound across approval and execution phases. Attackers can obtain approval for script execution, modify the approved script file before execution, and execute different content while maintaining the same approved command shape.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.3.8 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/c76d29208bf6a7f058d2cf582519d28069e4Patch
- https://github.com/openclaw/openclaw/commit/cf3a479bd1204f62eef7dd82b4aa328749aePatch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-8g75-q649-6pv6Vendor Advisory
- https://www.vulncheck.com/advisories/openclaw-script-content-modification-via-muThird Party Advisory
FAQ
What is CVE-2026-32921?
CVE-2026-32921 is a vulnerability with a CVSS score of 6.3 (MEDIUM). OpenClaw before 2026.3.8 contains an approval bypass vulnerability in system.run where mutable script operands are not bound across approval and execution phases. Attackers can obtain approval for scr...
How severe is CVE-2026-32921?
CVE-2026-32921 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32921?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.