system.run exec allowlist analysis treated wrapper binaries as the effective executable and did not fully unwrap env/shell-dispatch wrappers.
This allowed wrapper-smuggled payloads (for example env bash -lc ...) to satisfy an allowlist entry for the wrapper while executing non-allowlisted commands.
On affected versions, an actor who can trigger system.run requests under an allowlist policy could bypass intended allowlist restrictions by routing execution through wrapper binaries.
openclaw (npm)<= 2026.2.21-22026.2.22 (pre-set below so publish can happen immediately after npm release)2b63592be57782c8946e521bc81286933f0f99c7patched_versions is pre-set to the planned next release (>= 2026.2.22).
After npm 2026.2.22 is published, this advisory can be published directly without further metadata edits.
OpenClaw thanks @tdjackey for reporting.
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T23:13:51Z",
"cwe_ids": [
"CWE-78",
"CWE-863"
],
"nvd_published_at": null,
"severity": "HIGH"
}