Cyber Posture

CVE-2026-32979

HighPublic PoC

Published: 29 March 2026

Published
29 March 2026
Modified
30 March 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0005 15.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32979 is a high-severity Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 15.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-14 (Signed Components) and SC-34 (Non-modifiable Executable Programs).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventdetect

Verifies the integrity of software and scripts prior to execution to prevent running modified approved scripts exploited via the time-of-check to time-of-use vulnerability.

prevent

Enforces execution of scripts only from non-modifiable storage or in a non-modifiable state, eliminating the window for attackers to rewrite local scripts between approval and execution.

prevent

Requires signed components for scripts, ensuring validity and integrity checks that block execution of tampered approved scripts lacking valid signatures.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

TOCTOU race condition (CWE-367) in script approval directly enables arbitrary code execution by allowing post-approval modification of local scripts; maps to client-side exploitation (T1203) resulting in command/script interpreter abuse (T1059) that requires user interaction to approve the initial script (T1204.002).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local code by modifying scripts between approval and execution when exact file binding cannot occur. Remote attackers can change approved local scripts before execution to achieve unintended…

more

code execution as the OpenClaw runtime user.

Deeper analysisAI

CVE-2026-32979 is an approval integrity vulnerability (CWE-367) in OpenClaw versions before 2026.3.11. It enables attackers to execute rewritten local code by modifying scripts between the approval and execution phases, especially when exact file binding cannot occur. The issue was published on 2026-03-29 and carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).

The vulnerability can be exploited by local attackers with low privileges who induce user interaction, such as through social engineering. According to the description, remote attackers can change approved local scripts before execution, achieving unintended code execution as the OpenClaw runtime user and resulting in high confidentiality, integrity, and availability impacts.

Advisories detailing the issue are available at https://github.com/openclaw/openclaw/security/advisories/GHSA-xf99-j42q-5w5p and https://www.vulncheck.com/advisories/openclaw-unbound-interpreter-and-runtime-commands-bypass-in-node-host-approval, which likely recommend upgrading to OpenClaw 2026.3.11 or later to mitigate the vulnerability by addressing the script modification window.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.3.11

CVEs Like This One

CVE-2026-41296Same product: Openclaw Openclaw
CVE-2026-32988Same product: Openclaw Openclaw
CVE-2026-41295Same product: Openclaw Openclaw
CVE-2026-41336Same product: Openclaw Openclaw
CVE-2026-41384Same product: Openclaw Openclaw
CVE-2026-32920Same product: Openclaw Openclaw
CVE-2026-35643Same product: Openclaw Openclaw
CVE-2026-41355Same product: Openclaw Openclaw
CVE-2026-35641Same product: Openclaw Openclaw
CVE-2026-34426Same product: Openclaw Openclaw

References