Duplicate Advisory: OpenClaw: Unrecognized script runners could bypass `system.run` approval integrity
Critical severity
GitHub Reviewed
Published
Mar 29, 2026
to the GitHub Advisory Database
•
Updated Apr 6, 2026
Withdrawn
This advisory was withdrawn on Apr 6, 2026
Description
Published by the National Vulnerability Database
Mar 29, 2026
Published to the GitHub Advisory Database
Mar 29, 2026
Reviewed
Apr 6, 2026
Withdrawn
Apr 6, 2026
Last updated
Apr 6, 2026
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-qc36-x95h-7j53. This link is maintained to preserve external references.
Original Description
OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute modified code under the approved run context.
References