Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6pfc-6m7w-m8fx | OpenClaw has a gateway exec allowlist allow-always bypass via unregistered /usr/bin/script wrapper |
Wed, 29 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.28 contains an exec allowlist bypass vulnerability where allow-always persistence fails to unwrap /usr/bin/script and similar wrappers before storing trust decisions. Attackers can obtain user approval for one wrapped command to persist trust for wrapper binaries that execute different underlying programs. | |
| Title | OpenClaw < 2026.3.28 - Exec Allowlist Bypass via Unregistered /usr/bin/script Wrapper | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-807 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T19:26:39.243Z
Reserved: 2026-04-20T14:13:45.348Z
Link: CVE-2026-41390
Updated: 2026-04-29T19:26:30.403Z
Status : Analyzed
Published: 2026-04-28T19:37:42.173
Modified: 2026-04-30T20:38:27.090
Link: CVE-2026-41390
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:15:43Z
Github GHSA