CVE-2026-29607
Severity CVSS v4.0:
HIGH
Type:
CWE-78
OS Command Injections
Publication date:
19/03/2026
Last modified:
19/03/2026
Description
OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in allow-always wrapper persistence that allows attackers to bypass approval checks by persisting wrapper-level allowlist entries instead of validating inner executable intent. Remote attackers can approve benign wrapped system.run commands and subsequently execute different payloads without approval, enabling remote code execution on gateway and node-host execution flows.
Impact
Base Score 4.0
7.10
Severity 4.0
HIGH
Base Score 3.x
6.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | 2026.2.22 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



