Cyber Posture

CVE-2026-32978

HighPublic PoC

Published: 29 March 2026

Published
29 March 2026
Modified
30 March 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0005 14.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32978 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Openclaw Openclaw. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 14.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-5 (Access Restrictions for Change) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to JavaScript (T1059.007) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the vulnerability by requiring timely installation of the OpenClaw 2026.3.11 patch that fixes improper binding of mutable file operands in system.run approvals.

preventdetect

Requires integrity checks on scripts and files to detect unauthorized modifications between approval and execution, preventing tampered code from running under approved context.

prevent

Restricts low-privilege attackers from rewriting referenced mutable scripts by limiting change access to authorized personnel or roles.

MITRE ATT&CK Enterprise TechniquesAI

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Vulnerability is a TOCTOU flaw in script approval binding for JS/TS runners (tsx/jiti), directly enabling arbitrary script execution (T1059.007) after user approval and facilitating privilege escalation via scope change to high CIA impact (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute…

more

modified code under the approved run context.

Deeper analysisAI

CVE-2026-32978 is an approval integrity vulnerability in OpenClaw versions prior to 2026.3.11, published on 2026-03-29. The issue affects the system.run approval mechanism, which fails to properly bind mutable file operands when using certain script runners such as tsx and jiti. This flaw, classified under CWE-863 (Incorrect Authorization), has a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H), indicating high severity with network accessibility but requiring low privileges, high attack complexity, and user interaction.

An attacker with low privileges can exploit this vulnerability by crafting benign script commands that reference mutable files, tricking a user into approving the execution via the system's approval process. Once approved, the attacker can rewrite the referenced scripts on disk before execution, allowing modified malicious code to run under the context of the original approval. This enables high-impact confidentiality, integrity, and availability violations with changed scope.

Advisories, including those from the OpenClaw GitHub security page (GHSA-qc36-x95h-7j53) and VulnCheck, detail the vulnerability and recommend updating to OpenClaw 2026.3.11 or later to mitigate the issue by ensuring proper binding of file operands during approvals.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.3.11

CVEs Like This One

CVE-2026-33577Same product: Openclaw Openclaw
CVE-2026-32915Same product: Openclaw Openclaw
CVE-2026-42432Same product: Openclaw Openclaw
CVE-2026-41344Same product: Openclaw Openclaw
CVE-2026-32918Same product: Openclaw Openclaw
CVE-2026-41371Same product: Openclaw Openclaw
CVE-2026-32042Same product: Openclaw Openclaw
CVE-2026-41379Same product: Openclaw Openclaw
CVE-2026-32972Same product: Openclaw Openclaw
CVE-2026-41404Same product: Openclaw Openclaw

References