GHSA-mxmg-3p7m-2ghr: Duplicate Advisory: OpenClaw: system.run approval identity mismatch could execute a different binary than displayed
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-hwpq-rrpf-pgcq. This link is maintained to preserve external references.
Original Description
OpenClaw versions prior to 2026.2.25 contain an approval-integrity bypass vulnerability in system.run where rendered command text is used as approval identity while trimming argv token whitespace, but runtime execution uses raw argv. An attacker can craft a trailing-space executable token to execute a different binary than what the approver displayed, allowing unexpected command execution under the OpenClaw runtime user when they can influence command argv and reuse an approval context.
References
- github.com/advisories/GHSA-mxmg-3p7m-2ghr
- github.com/openclaw/openclaw/commit/03e689fc89bbecbcd02876a95957ef1ad9caa176
- github.com/openclaw/openclaw/security/advisories/GHSA-hwpq-rrpf-pgcq
- nvd.nist.gov/vuln/detail/CVE-2026-32065
- www.vulncheck.com/advisories/openclaw-approval-identity-mismatch-in-system-run-command-execution
Code Behaviors & Features
Detect and mitigate GHSA-mxmg-3p7m-2ghr with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →