Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5f9p-f3w2-fwch | OpenClaw macOS companion app (beta): allowlist parsing mismatch for system.run shell chains |
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.22 contain an allowlist parsing mismatch vulnerability in the macOS companion app that allows authenticated operators to bypass exec approval checks. Attackers with operator.write privileges and a paired macOS beta node can craft shell-chain payloads that pass incomplete allowlist validation and execute arbitrary commands on the paired host. | |
| Title | OpenClaw < 2026.2.22 - Allowlist Parsing Mismatch in system.run Shell Chains | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-184 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T16:56:25.397Z
Reserved: 2026-03-10T19:48:11.111Z
Link: CVE-2026-31993
Updated: 2026-03-23T16:45:24.086Z
Status : Analyzed
Published: 2026-03-19T02:16:04.277
Modified: 2026-03-19T18:50:06.617
Link: CVE-2026-31993
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:10:35Z
Github GHSA