<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41380 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41380/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41380/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-exec-approval-bypass/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-exec-approval-bypass/</guid><description>OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.</description><content:encoded><![CDATA[<p>OpenClaw, a software of undetermined function, is vulnerable to an execution approval bypass (CVE-2026-41380) affecting versions prior to 2026.3.28. The vulnerability resides in <code>exec-approvals-allowlist.ts</code>, where the system incorrectly trusts wrapper carrier executables instead of the actual invoked targets. This flaw allows attackers to manipulate positional carrier executable routing through dispatch wrappers. By exploiting this, attackers can establish overly broad allowlist entries, effectively weakening the intended execution approval boundaries. This vulnerability was reported on April 28, 2026, and poses a significant risk by allowing unauthorized code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with OpenClaw installed, potentially through social engineering or exploiting other vulnerabilities.</li>
<li>The attacker identifies a dispatch wrapper executable that is already on the allowlist.</li>
<li>The attacker crafts a malicious payload to be executed through the identified wrapper.</li>
<li>The attacker leverages positional carrier executable routing to pass the malicious payload to the wrapper.</li>
<li>OpenClaw&rsquo;s <code>exec-approvals-allowlist.ts</code> incorrectly trusts the wrapper, adding it to the allow-always list.</li>
<li>The attacker executes arbitrary commands using the allowlisted wrapper with the malicious payload, bypassing intended restrictions.</li>
<li>The attacker escalates privileges by executing privileged commands through the bypassed execution approval mechanism.</li>
<li>The attacker achieves persistence by utilizing the now-trusted wrapper to execute malicious code repeatedly.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41380 allows attackers to bypass intended execution restrictions within OpenClaw. This can lead to arbitrary code execution, privilege escalation, and persistent malicious activity. The vulnerability allows attackers to effectively weaken the security posture of systems relying on OpenClaw&rsquo;s execution approval mechanisms, potentially leading to complete system compromise. The precise number of affected installations is unknown, but any system running a vulnerable version of OpenClaw is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.28 or later to remediate CVE-2026-41380.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious OpenClaw Wrapper Execution&rdquo; to identify potential exploitation attempts.</li>
<li>Review existing allowlist entries within OpenClaw to identify and remove any overly broad or suspicious entries that may have been created through exploitation of CVE-2026-41380.</li>
<li>Monitor OpenClaw&rsquo;s logs for unexpected or unauthorized execution events related to wrapper executables as described in the vulnerability details.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-41380</category><category>execution-approval-bypass</category><category>privilege-escalation</category><category>defense-evasion</category></item></channel></rss>