CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-HWPQ-RRPF-PGCQ
7.2

GHSA-HWPQ-RRPF-PGCQ: Execution Approval Bypass in OpenClaw system.run

Amit Schendel
Amit Schendel
Senior Security Researcher

Mar 3, 2026·4 min read·9 visits

PoC Available

Executive Summary (TL;DR)

OpenClaw versions before 2026.2.25 contain a UI spoofing vulnerability in the `system.run` approval flow. Attackers can execute binaries with trailing whitespace in their names while displaying a clean, benign command to the user for approval.

A critical vulnerability in the OpenClaw AI assistant allows attackers to bypass execution approval mechanisms. Due to a discrepancy between how commands are displayed to the user and how they are executed by the system, an attacker can trick a user into approving a malicious binary execution under the guise of a benign command. This issue affects the `system.run` tool and allows for arbitrary code execution if the attacker can influence the AI agent's tool calls.

Vulnerability Overview

OpenClaw is a personal AI assistant capable of interacting with the local operating system through the system.run tool. To maintain security, sensitive actions—specifically shell command executions—require explicit user confirmation. The system presents the proposed command to the user, who must approve it before execution proceeds.

This vulnerability, identified as GHSA-HWPQ-RRPF-PGCQ, represents a bypass of this approval mechanism. It exploits a logic error in how command arguments are normalized for display versus how they are passed to the execution engine. Consequently, the command string shown in the approval prompt may differ semantically from the command actually executed by the underlying operating system. This allows an attacker (via prompt injection or a compromised agent instruction) to execute arbitrary binaries that the user believes are harmless system utilities.

Root Cause Analysis

The root cause of this vulnerability is a CWE-290: Authentication Bypass by Spoofing, specifically caused by an "identity mismatch" between the presentation layer and the execution layer.

When the OpenClaw agent constructs a command, it passes an array of arguments (argv). The approval system previously generated a user-facing string from this array to display in the UI. During this generation, the system performed "lossy" normalization, specifically trimming whitespace from tokens to improve readability. However, the actual execution logic passed the raw, un-normalized argv array to the child_process or equivalent system call.

This created a discrepancy: a token like 'runner ' (with a trailing space) would be rendered as 'runner' in the UI. If a file named 'runner ' existed on the system, the OS would execute that specific binary, while the user would believe they were authorizing the standard 'runner' utility. The system failed to bind the approval to the exact cryptographic or byte-for-byte identity of the argument vector.

Code Analysis

The vulnerability resided in src/gateway/node-invoke-system-run-approval.ts and the formatting logic in src/infra/system-run-command.ts. The fix introduces strict "Argv Identity Binding".

Vulnerable Logic (Conceptual): Previously, the validation checked if the rendered command string matched the approved string. This was insufficient because multiple argv configurations could map to the same rendered string.

Patched Logic: The fix, implemented in version 2026.2.25, adds a strict element-wise comparison of the requested argv against the approved argv. The following code snippet from the patch demonstrates the new validation step:

// src/gateway/node-invoke-system-run-approval.ts
 
// New validation ensures the exact array structure matches
if (requestedArgv) {
  // Fail if lengths differ
  if (requestedArgv.length === 0 || requestedArgv.length !== argv.length) {
    return false;
  }
  // Strict comparison of every token
  for (let i = 0; i < requestedArgv.length; i += 1) {
    if (requestedArgv[i] !== argv[i]) {
      return false;
    }
  }
}

Additionally, the formatExecCommand utility was updated to stop trimming whitespace and instead wrap tokens containing whitespace in quotes. This ensures that if an agent requests 'runner ', the UI explicitly displays '"runner "', alerting the user to the anomaly.

Exploitation Methodology

To exploit this vulnerability, an attacker requires the ability to influence the OpenClaw agent's tool calls (e.g., via prompt injection) and the ability to place a file on the victim's filesystem (or identify an existing binary with a trailing space in its name).

  1. Preparation: The attacker places a malicious script or binary named "safe_tool " (note the trailing space) in a directory within the system PATH.
  2. Injection: The attacker instructs the OpenClaw agent: "Please run the system safe_tool to check status." ensuring the agent constructs the argv as ['safe_tool ', '-v'].
  3. Spoofing: The OpenClaw gateway receives the request. The formatter trims the trailing space, presenting the user with the prompt: Allow execution of: safe_tool -v.
  4. Execution: The user, recognizing safe_tool as a legitimate utility, approves the request. The system executes the raw argv[0], which is "safe_tool ", triggering the malicious payload.

Impact Assessment

This vulnerability has a High severity (CVSS 7.2) because it completely undermines the integrity of the human-in-the-loop security model OpenClaw relies on.

  • Arbitrary Code Execution: Successful exploitation allows code execution with the privileges of the OpenClaw process (typically the user's level).
  • Trust Erosion: The vulnerability allows the AI to perform actions that the user explicitly believes they have vetted, facilitating social engineering attacks where the AI "lies" to the user about its activities.
  • Attack Vector: While it requires user interaction (approval), the interaction is manipulated, making the vector effective against security-conscious users who actually read the prompts.

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H indicates that while high privileges (control over agent instructions) and user interaction are required, the impact on Confidentiality, Integrity, and Availability is total relative to the user's context.

Official Patches

OpenClawFix commit on GitHub

Fix Analysis (1)

Technical Appendix

CVSS Score
7.2/ 10
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H

Affected Systems

OpenClaw AI Assistant (npm package)

Affected Versions Detail

Product
Affected Versions
Fixed Version
openclaw
OpenClaw
< 2026.2.252026.2.25
AttributeDetail
CWE IDCWE-290
Attack VectorNetwork (Agent Instruction)
CVSS7.2 (High)
ImpactArbitrary Code Execution
Exploit StatusPoC Available
VendorOpenClaw

MITRE ATT&CK Mapping

T1204User Execution
Execution
T1036Masquerading
Defense Evasion
CWE-290
Authentication Bypass by Spoofing

Authentication Bypass by Spoofing

Known Exploits & Detection

GitHub AdvisoryAdvisory containing PoC methodology

Vulnerability Timeline

Vulnerability reported by @tdjackey
2026-02-24
Fix committed to main branch
2026-02-26
Version 2026.2.25 released
2026-02-26
GHSA-HWPQ-RRPF-PGCQ published
2026-02-26

References & Sources

  • [1]GHSA-HWPQ-RRPF-PGCQ Advisory
  • [2]OpenClaw Security Policy
Related Vulnerabilities
CVE-2026-26325

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.