Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

465+ Articles
115+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-32973: OpenClaw Exec Allowlist Bypass via Glob Wildcard Overmatch
CVE-2026-32973: OpenClaw Exec Allowlist Bypass via Glob Wildcard Overmatch

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-32973

CVE-2026-32973: OpenClaw Exec Allowlist Bypass via Glob Wildcard Overmatch

A critical CVSS 9.8 vulnerability in OpenClaw allows attackers to bypass the exec allowlist by exploiting improper glob pattern normalization where the ? wildcard ovematches across POSIX path segments.

Dylan H.

Security Team

March 30, 2026
5 min read

Affected Products

  • OpenClaw before 2026.3.11

Executive Summary

A critical-severity exec allowlist bypass vulnerability (CVE-2026-32973, CVSS 9.8) has been disclosed in OpenClaw versions prior to 2026.3.11. The flaw resides in the matchesExecAllowlistPattern function, which uses lowercasing and glob matching to enforce which commands are permitted. Improper normalization allows an attacker to craft a path using the ? wildcard that ovematches across POSIX path segments, defeating the allowlist entirely and enabling arbitrary command execution.

CVSS Score: 9.8 (Critical)

Published to the NVD on March 29, 2026, this vulnerability presents a severe risk to any deployment relying on OpenClaw's exec allowlist as a security boundary.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-32973
CVSS Score9.8 (Critical)
CWECWE-184: Incomplete List of Disallowed Inputs
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Vulnerable ComponentmatchesExecAllowlistPattern function
Root CauseGlob ? wildcard ovematches across POSIX path separators

Affected Products

VendorProductAffected VersionsFixed Version
OpenClawOpenClawAll versions before 2026.3.112026.3.11

Vulnerability Details

Glob Pattern Normalization Flaw

OpenClaw implements an exec allowlist to restrict which commands agents may run. The matchesExecAllowlistPattern function normalizes allowlist patterns using lowercasing before applying glob matching. The critical flaw is that the ? wildcard — intended to match exactly one character — is permitted to match the POSIX path separator /.

This means an allowlist entry such as:

/allowed/commands/*

Can be bypassed with a crafted path like:

/bypassed?commands?malicious

Because ? matches /, the normalization and glob matching incorrectly evaluates the crafted path as matching the allowlist pattern, permitting execution of commands that should be blocked.

Attack flow:

1. Attacker identifies a command outside the exec allowlist
2. Attacker constructs a path using ? in place of / separators
3. matchesExecAllowlistPattern lowercases and glob-matches the crafted path
4. The ? wildcard ovematches path separators, returning a false allowlist match
5. OpenClaw executes the disallowed command, bypassing the security boundary

Impact of Successful Exploitation

A successful exploit gives the attacker the ability to execute arbitrary commands that should have been blocked by the allowlist, including:

  • Escape agent sandboxes — execute OS-level commands outside sanctioned paths
  • Access sensitive data — read files, credentials, or secrets accessible from the agent runtime
  • Establish persistence — plant backdoors or modify configuration outside allowlisted paths
  • Lateral movement — exploit agent-level network access to pivot to internal services
  • Full system compromise — depending on the privilege level of the OpenClaw agent process

The CVSS score of 9.8 reflects zero authentication requirement, low complexity, network accessibility, and full impact on confidentiality, integrity, and availability.


Deployment Context and Risk

OpenClaw is an AI agent orchestration platform used in automated pipeline and enterprise workflow environments. The exec allowlist is a core security boundary ensuring agents can only run sanctioned commands.

Deployment ContextRisk LevelNotes
Internet-exposed agent endpointsCriticalRemote exploitation with no authentication
Internal pipeline infrastructureCriticalAny attacker who can send agent requests
Multi-tenant agent platformsCriticalCross-tenant command execution possible
CI/CD environmentsCriticalBuild pipeline compromise and secret exfiltration

Recommended Mitigations

1. Upgrade Immediately

# Upgrade OpenClaw to 2026.3.11 or later
# The fix corrects glob pattern normalization to prevent ? from matching /

Upgrade to OpenClaw 2026.3.11 which patches matchesExecAllowlistPattern to prevent the ? wildcard from matching the POSIX path separator /.

2. Restrict Exec Allowlist Surface

While patching, review and tighten your exec allowlist entries:

  • Remove any overly broad wildcard patterns
  • Use absolute paths in allowlist entries where possible
  • Validate that no allowlist entry can be satisfied by path manipulation

3. Restrict Agent Network Exposure

# Limit which services can submit exec requests to OpenClaw agents
# Block direct internet access to agent endpoints
iptables -I INPUT -p tcp --dport <AGENT_PORT> -s <TRUSTED_CIDR> -j ACCEPT
iptables -I INPUT -p tcp --dport <AGENT_PORT> -j DROP

4. Monitor for Exploitation Indicators

IndicatorDescription
Commands executing outside expected pathsAllowlist bypass successful
Unexpected process spawns from the agent runtimePost-exploitation activity
Anomalous network connections from agent processesData exfiltration or C2
Allowlist pattern match logs showing / in ? positionsActive exploitation attempt

Post-Remediation Checklist

  1. Verify patch applied — confirm OpenClaw version is 2026.3.11 or later
  2. Audit exec allowlist patterns — review all patterns for overly broad glob usage
  3. Review agent execution logs — check for commands executed outside expected paths prior to patching
  4. Rotate secrets — if exploitation occurred, rotate all secrets accessible from the agent runtime
  5. Audit downstream systems — check systems the agent had network access to for signs of lateral movement

References

  • CVE-2026-32973 — NVD
  • CWE-184: Incomplete List of Disallowed Inputs — MITRE

Related Reading

  • CVE-2026-32975: OpenClaw Zalouser Authorization Bypass
  • CVE-2026-32987: OpenClaw Bootstrap Code Replay Privilege Escalation
#CVE#OpenClaw#Allowlist Bypass#Glob#NVD#Vulnerability

Related Articles

CVE-2026-32975: OpenClaw Zalouser Weak Authorization via Mutable Group Display Names

A critical CVSS 9.8 authorization bypass in OpenClaw's Zalouser allowlist mode matches mutable group display names instead of stable identifiers, letting attackers create spoofed groups to hijack channel routing.

5 min read

CVE-2026-32987: OpenClaw Bootstrap Code Replay Enables Privilege Escalation to operator.admin

A critical CVSS 9.8 vulnerability in OpenClaw allows attackers to replay a valid bootstrap setup code multiple times before approval, escalating device pairing scopes up to operator.admin privilege level.

5 min read

CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope Elevation

A critical CVSS 9.9 authorization bypass in OpenClaw allows authenticated users to self-declare elevated scopes over WebSocket connections without...

6 min read
Back to all Security Alerts