<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-32973 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32973/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 13:17:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32973/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Exec Allowlist Bypass via POSIX Path Overmatching (CVE-2026-32973)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-bypass/</link><pubDate>Sun, 29 Mar 2026 13:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-bypass/</guid><description>OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability (CVE-2026-32973) due to improper normalization of patterns, allowing attackers to execute unintended commands via wildcard matching in POSIX paths.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.11 are susceptible to an exec allowlist bypass vulnerability, identified as CVE-2026-32973. The vulnerability stems from the <code>matchesExecAllowlistPattern</code> function&rsquo;s flawed normalization process, specifically its handling of lowercasing and glob matching. This leads to overmatching on POSIX paths, enabling attackers to circumvent intended restrictions. By leveraging the &lsquo;?&rsquo; wildcard, attackers can match across path segments to execute commands or access paths…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-32973</category><category>openclaw</category><category>allowlist-bypass</category></item></channel></rss>