Cyber Posture

CVE-2026-29607

MediumPublic PoCRCE

Published: 19 March 2026

Published
19 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0008 23.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29607 is a medium-severity OS Command Injection (CWE-78) vulnerability in Openclaw Openclaw. Its CVSS base score is 6.8 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources like executable intent validation, directly preventing the wrapper-level allowlist persistence bypass.

prevent

Validates inputs to system.run commands to neutralize special elements and verify inner executable intent, mitigating the CWE-78 OS command authorization bypass.

prevent

Requires timely identification, reporting, and correction of flaws like the allow-always wrapper persistence vulnerability, enabling patching to OpenClaw 2026.2.22 or later.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Authorization bypass in wrapper persistence (CWE-78) directly enables remote attackers to achieve arbitrary command/payload execution after tricking approval, mapping to public-facing application exploitation (T1190) and command/scripting interpreter abuse (T1059) for RCE on gateway/node flows.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in allow-always wrapper persistence that allows attackers to bypass approval checks by persisting wrapper-level allowlist entries instead of validating inner executable intent. Remote attackers can approve benign wrapped system.run commands…

more

and subsequently execute different payloads without approval, enabling remote code execution on gateway and node-host execution flows.

Deeper analysisAI

CVE-2026-29607 is an authorization bypass vulnerability affecting OpenClaw versions prior to 2026.2.22, specifically in the allow-always wrapper persistence mechanism. The flaw allows attackers to bypass approval checks by persisting wrapper-level allowlist entries rather than validating the intent of the inner executable. This issue, classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), carries a CVSS v3.1 base score of 6.8 (AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H) and was published on 2026-03-19.

Remote attackers with high privileges can exploit this vulnerability by tricking users into approving benign wrapped system.run commands. Once approved, attackers can subsequently execute arbitrary different payloads without further approval, achieving remote code execution on gateway and node-host execution flows.

Mitigation is addressed in OpenClaw version 2026.2.22 and later, as detailed in the fixing commit at https://github.com/openclaw/openclaw/commit/24c954d972400f508814532dea0e4dcb38418bb0. Additional guidance appears in the GitHub security advisory at https://github.com/openclaw/openclaw/security/advisories/GHSA-6j27-pc5c-m8w8 and the VulnCheck advisory at https://www.vulncheck.com/advisories/openclaw-authorization-bypass-via-allow-always-wrapper-persistence.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.22

CVEs Like This One

CVE-2026-28470Same product: Openclaw Openclaw
CVE-2026-22179Same product: Openclaw Openclaw
CVE-2026-32034Same product: Openclaw Openclaw
CVE-2026-28391Same product: Openclaw Openclaw
CVE-2026-28460Same product: Openclaw Openclaw
CVE-2026-32917Same product: Openclaw Openclaw
CVE-2026-32003Same product: Openclaw Openclaw
CVE-2026-35650Same product: Openclaw Openclaw
CVE-2026-31996Same product: Openclaw Openclaw
CVE-2026-32010Same product: Openclaw Openclaw

References