CVE ReportsGHSA-7f4q-9rqh-x36p: Execution Allowlist Bypass in OpenClaw macOS via Basename...
Vulnerability ID: GHSA-7F4Q-9RQH-X36P
CVSS Score: 7.5
Published: 2026-03-03
A logic vulnerability in the OpenClaw macOS application allowed attackers to bypass the optional execution allowlist (system.run) restrictions. The flaw existed in the ExecAllowlistMatcher component, which permitted command execution based solely on the filename (basename) of the target binary rather than its absolute path. This enabled malicious actors to execute arbitrary code by renaming malicious binaries to match allowed system commands (e.g., creating a malicious binary named echo to match an allowlist entry for echo), effectively circumventing the intended security policy.
OpenClaw's macOS allowlist failed to enforce path specificity, allowing execution of malicious binaries that shared a filename with allowed commands. Fixed in commit dd41fa by removing basename fallback matching.
Feb 21 2026 Build)Remove insecure basename matching and enforce path patterns for allowlist
swift
- } else if self.matches(pattern: pattern, target: executableName) {
- return entry
- }
+ if ExecAllowlistMatcher.isPathPattern(pattern) &&
+ self.matches(pattern: pattern, target: resolution.executablePath) {
+ return entry
+ }
/usr/bin/python3 instead of python).Remediation Steps:
system.run allowlist configuration.Read the full report for GHSA-7F4Q-9RQH-X36P on our website for more details including interactive diagrams and full exploit analysis.