GHSA-3p2x-hjxj-c7rv: Duplicate Advisory: OpenClaw's system.run approval TOCTOU via mutable symlink cwd target on node host
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mwcg-wfq3-4gjc. This link is maintained to preserve external references.
Original Description
OpenClaw versions prior to 2026.2.25 contain a time-of-check-time-of-use vulnerability in approval-bound system.run execution where the cwd parameter is validated at approval time but resolved at execution time. Attackers can retarget a symlinked cwd between approval and execution to bypass command execution restrictions and execute arbitrary commands on node hosts.
References
- github.com/advisories/GHSA-3p2x-hjxj-c7rv
- github.com/openclaw/openclaw/commit/f789f880c934caa8be25b38832f27f90f37903db
- github.com/openclaw/openclaw/security/advisories/GHSA-mwcg-wfq3-4gjc
- nvd.nist.gov/vuln/detail/CVE-2026-32043
- www.vulncheck.com/advisories/openclaw-time-of-check-time-of-use-via-mutable-symlink-in-system-run-cwd-parameter
Code Behaviors & Features
Detect and mitigate GHSA-3p2x-hjxj-c7rv with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →