| ID |
CVE-2026-31993
|
| Sažetak |
OpenClaw versions prior to 2026.2.22 contain an allowlist parsing mismatch vulnerability in the macOS companion app that allows authenticated operators to bypass exec approval checks. Attackers with operator.write privileges and a paired macOS beta node can craft shell-chain payloads that pass incomplete allowlist validation and execute arbitrary commands on the paired host. |
| Reference |
|
| CVSS |
| Base: | 4.8 |
| Impact: | 4.2 |
| Exploitability: | 0.5 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
HIGH |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| NONE |
HIGH |
LOW |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:L |
| Zadnje važnije ažuriranje |
19-03-2026 - 02:16 |
| Objavljeno |
19-03-2026 - 02:16 |