CVE-2026-35666 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: April 10, 2026
OpenClaw - Broken Access Control
Published: April 10, 2026Updated: April 10, 2026Remote Exploitable
Overview
OpenClaw < 2026.3.22 contains an allowlist bypass vulnerability caused by failure to unwrap /usr/bin/time wrappers in system.run approvals, letting attackers bypass executable binding restrictions using unregistered time wrappers, exploit requires crafted commands.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Attackers can bypass executable binding restrictions, potentially executing unauthorized commands.
Mitigation
Update to version 2026.3.22 or later.
References
- https://github.com/openclaw/openclaw/commit/39409b6a6dd4239deea682e626bac9ba547bfb14
- https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87
- https://github.com/openclaw/openclaw/security/advisories/GHSA-qm9x-v7cx-7rq4
- https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-unregistered-time-dispatch-wrapper
Related Resources
Details
- CVE ID
- CVE-2026-35666
- Severity
- High
- CVSS Score
- 8.8
- Type
- broken_access_control
- Status
- new
CWE
- CWE-706
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H