Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q399-23r3-hfx4 | OpenClaw: system.run approvals did not bind PATH-token executable identity, enabling post-approval executable rebind |
Thu, 19 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.3.1 fail to pin executable identity for non-path-like argv[0] tokens in system.run approvals, allowing post-approval executable rebind attacks. Attackers can modify PATH resolution after approval to execute a different binary than the operator approved, enabling arbitrary command execution. | |
| Title | OpenClaw < 2026.3.1 - Executable Rebind via Unbound PATH-token in system.run Approvals | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-367 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-19T14:06:06.088Z
Reserved: 2026-03-10T19:48:11.111Z
Link: CVE-2026-31997
Updated: 2026-03-19T14:05:54.722Z
Status : Analyzed
Published: 2026-03-19T02:16:05.130
Modified: 2026-03-19T18:49:06.227
Link: CVE-2026-31997
No data.
OpenCVE Enrichment
Updated: 2026-03-25T11:55:34Z
Github GHSA