OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that should require explicit user approval, circumventing the intended security boundary.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that should require explicit user approval, circumventing the intended security boundary. | |
| Title | OpenClaw < 2026.4.8 - strictInlineEval Approval Boundary Bypass via Approval-Timeout Fallback | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-636 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-28T18:10:14.230Z
Reserved: 2026-04-27T11:38:59.195Z
Link: CVE-2026-42423
No data.
Status : Awaiting Analysis
Published: 2026-04-28T19:37:46.083
Modified: 2026-04-28T20:10:23.367
Link: CVE-2026-42423
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:00:13Z