OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that should require explicit user approval, circumventing the intended security boundary.
https://github.com/openclaw/openclaw/security/advisories/GHSA-q2gc-xjqw-qp89
https://github.com/openclaw/openclaw/commit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5
Published: 2026-04-28
Updated: 2026-04-28
Base Score: 7.1
Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 7.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 7.7
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: High