Critical (9.8)

CVE-2026-32973: OpenClaw

CVE-2026-32973

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX ...

Overview

A critical security vulnerability has been discovered in OpenClaw, a software tool. This flaw, tracked as CVE-2026-32973, allows attackers to bypass the application’s security restrictions and execute unauthorized commands or programs on affected systems.

Vulnerability Explained

In simple terms, OpenClaw uses an “allowlist” to define which programs or commands are permitted to run. This is a core security feature. The vulnerability exists in the function that checks if a requested path matches the allowed patterns. Due to a flaw in how the software processes file paths-specifically by incorrectly handling wildcard characters (?) and performing case-insensitive matching-an attacker can craft a path that tricks the system into approving an unauthorized program. For example, a path intended to allow /usr/bin/safe_tool could be exploited to also allow a malicious program in a different directory.

Impact and Risk

This is a critical vulnerability with a CVSS score of 9.8. Successful exploitation could allow an attacker with basic access to a system to run any command or program, potentially leading to:

  • Full system compromise and control.
  • Installation of malware, ransomware, or backdoors.
  • Theft or destruction of sensitive data.
  • Use of the compromised system to attack other network resources.

Given the severity, all organizations using OpenClaw should treat this as a high-priority issue. For context on how such vulnerabilities can lead to major incidents, recent data breach reports are available at breach reports.

Remediation and Mitigation

The primary and most effective action is to update the software immediately.

1. Immediate Patching:

  • Action: Upgrade OpenClaw to version 2026.3.11 or later.
  • How: Obtain the update from the official OpenClaw distribution channels or your package manager. Test the update in a development environment before deploying widely.

2. Workarounds (If Patching is Delayed): If immediate updating is not possible, consider these temporary measures while you schedule the patch:

  • Restrict Access: Limit network and user access to systems running vulnerable versions of OpenClaw.
  • Review Logs: Closely monitor system and application logs for any unusual execution attempts or unexpected process activity.
  • Principle of Least Privilege: Ensure the OpenClaw service account runs with the minimum necessary system privileges to limit potential damage from exploitation.

Stay informed on emerging threats and patches by following the latest security news. Do not delay applying this update, as public disclosure increases the likelihood of active exploitation attempts.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.