<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-32971 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32971/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 31 Mar 2026 12:17:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32971/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Approval Integrity Vulnerability Leads to Code Execution (CVE-2026-32971)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-code-execution/</link><pubDate>Tue, 31 Mar 2026 12:17:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-code-execution/</guid><description>OpenClaw before 2026.3.11 exhibits an approval-integrity vulnerability where attackers can place wrapper binaries to execute local code after operators approve misleading command text, due to the system displaying extracted shell payloads instead of the actual executed arguments.</description><content:encoded><![CDATA[<p>OpenClaw, a software platform (details unspecified in the source), is vulnerable to an approval-integrity issue (CVE-2026-32971) affecting versions prior to 2026.3.11. This vulnerability resides within the <code>node-host system.run</code> approval process. The system displays extracted shell payloads instead of the actual arguments (<code>argv</code>) that will be executed. An attacker can exploit this by crafting malicious commands using wrapper binaries. By inducing operators to approve what appears to be benign…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32971</category><category>code-execution</category><category>approval-bypass</category></item></channel></rss>