CVE-2026-41380
🟡 Monitoruj
Luka w OpenClaw umożliwia atakującym osłabienie granic zatwierdzania wykonania.
CVSS
7.3
EPSS
0.0%
Exploit
none
Vendor
openclaw
Opis źródłowy (NVD)
OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows allow-always persistence to trust wrapper carrier executables instead of invoked targets. Attackers can exploit positional carrier executable routing through dispatch wrappers to establish broader allowlist entries than intended, weakening execution approval boundaries.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-28 19:37:40 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 15:51:33 UTC |
Referencje
- https://github.com/openclaw/openclaw/security/advisories/GHSA-p4x4-2r7f-wjxg (disclosure@vulncheck.com) [Vendor Advisory]
- https://www.vulncheck.com/advisories/openclaw-arbitrary-execution-allowlist-via-wrapper-carrier-executables (disclosure@vulncheck.com) [Third Party Advisory]