Skip to content
Threat Feed
high advisory

OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)

OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.

OpenClaw, a software of undetermined function, is vulnerable to an execution approval bypass (CVE-2026-41380) affecting versions prior to 2026.3.28. The vulnerability resides in exec-approvals-allowlist.ts, where the system incorrectly trusts wrapper carrier executables instead of the actual invoked targets. This flaw allows attackers to manipulate positional carrier executable routing through dispatch wrappers. By exploiting this, attackers can establish overly broad allowlist entries, effectively weakening the intended execution approval boundaries. This vulnerability was reported on April 28, 2026, and poses a significant risk by allowing unauthorized code execution.

Attack Chain

  1. Attacker gains initial access to a system with OpenClaw installed, potentially through social engineering or exploiting other vulnerabilities.
  2. The attacker identifies a dispatch wrapper executable that is already on the allowlist.
  3. The attacker crafts a malicious payload to be executed through the identified wrapper.
  4. The attacker leverages positional carrier executable routing to pass the malicious payload to the wrapper.
  5. OpenClaw’s exec-approvals-allowlist.ts incorrectly trusts the wrapper, adding it to the allow-always list.
  6. The attacker executes arbitrary commands using the allowlisted wrapper with the malicious payload, bypassing intended restrictions.
  7. The attacker escalates privileges by executing privileged commands through the bypassed execution approval mechanism.
  8. The attacker achieves persistence by utilizing the now-trusted wrapper to execute malicious code repeatedly.

Impact

Successful exploitation of CVE-2026-41380 allows attackers to bypass intended execution restrictions within OpenClaw. This can lead to arbitrary code execution, privilege escalation, and persistent malicious activity. The vulnerability allows attackers to effectively weaken the security posture of systems relying on OpenClaw’s execution approval mechanisms, potentially leading to complete system compromise. The precise number of affected installations is unknown, but any system running a vulnerable version of OpenClaw is at risk.

Recommendation

  • Upgrade OpenClaw to version 2026.3.28 or later to remediate CVE-2026-41380.
  • Implement the Sigma rule “Detect Suspicious OpenClaw Wrapper Execution” to identify potential exploitation attempts.
  • Review existing allowlist entries within OpenClaw to identify and remove any overly broad or suspicious entries that may have been created through exploitation of CVE-2026-41380.
  • Monitor OpenClaw’s logs for unexpected or unauthorized execution events related to wrapper executables as described in the vulnerability details.

Detection coverage 2

Detect Suspicious OpenClaw Wrapper Execution

high

Detects suspicious execution of wrapper executables potentially exploiting CVE-2026-41380 to bypass execution approvals.

sigma tactics: defense_evasion, privilege_escalation techniques: T1202 sources: process_creation, windows

Detect OpenClaw Exec-Approvals-Allowlist.ts Modification

medium

Detects modification of exec-approvals-allowlist.ts, potentially indicating an attempt to weaken execution approval boundaries.

sigma tactics: defense_evasion techniques: T1562.001 sources: file_event, windows

Detection queries are kept inside the platform. Get full rules →