← Retour aux CVEs
CVE-2026-29607
MEDIUM6.8
Description
OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in allow-always wrapper persistence that allows attackers to bypass approval checks by persisting wrapper-level allowlist entries instead of validating inner executable intent. Remote attackers can approve benign wrapped system.run commands and subsequently execute different payloads without approval, enabling remote code execution on gateway and node-host execution flows.
Details CVE
Score CVSS v3.16.8
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisHIGH
Interaction utilisateurREQUIRED
Publie3/19/2026
Derniere modification3/25/2026
Sourcenvd
Observations honeypot0
Produits affectes
openclaw:openclaw
Faiblesses (CWE)
CWE-78
References
https://github.com/openclaw/openclaw/commit/24c954d972400f508814532dea0e4dcb38418bb0(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-6j27-pc5c-m8w8(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/openclaw-authorization-bypass-via-allow-always-wrapper-persistence(disclosure@vulncheck.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.