Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h3rm-6x7g-882f | OpenClaw's Node system.run approval hardening wrapper semantic drift can execute unintended local scripts |
Thu, 19 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openclaw:openclaw:2026.3.1:*:*:*:*:node.js:*:* |
Thu, 19 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run node-host execution where argv rewriting changes command semantics. Attackers can place malicious local scripts in the working directory to execute unintended code despite operator approval of different command text. | |
| Title | OpenClaw 2026.3.1 < 2026.3.2 - Approval Integrity Bypass via system.run argv Rewriting | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-88 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-19T16:09:41.951Z
Reserved: 2026-03-04T16:16:15.967Z
Link: CVE-2026-29608
Updated: 2026-03-19T16:09:38.040Z
Status : Analyzed
Published: 2026-03-19T02:16:03.223
Modified: 2026-03-19T19:15:57.043
Link: CVE-2026-29608
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:10:40Z
Github GHSA