CVE-2026-43530
Path Traversal in OpenClaw via Busybox Toybox Applets
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | From 2026.2.23 (inc) to 2026.4.12 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-43530 is a high-severity vulnerability in OpenClaw versions between 2026.2.23 and before 2026.4.12. It involves a weakened exec approval binding related to the execution of busybox and toybox applets. These applets are multi-call binaries that can obscure which specific applet or command is actually run.
Because of this, attackers can bypass exec approval mechanisms designed to control which applets are allowed to execute. This bypass weakens the risk classification of unsafe applet invocations, potentially allowing unauthorized or unsafe commands to run.
The vulnerability is classified under CWE-863 (Incorrect Authorization) and was fixed by treating busybox and toybox as opaque mutable script runners with a fail-closed policy, meaning unsafe uses are blocked by default.
How can this vulnerability impact me? :
This vulnerability can allow attackers to obscure which applet or command is actually executed when using busybox or toybox multi-call binaries. As a result, exec approval mechanisms that are supposed to prevent unsafe or unauthorized commands from running can be bypassed.
This means that unsafe applet invocations might be executed without proper authorization or risk assessment, potentially leading to unauthorized actions, privilege escalation, or execution of malicious commands within affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the use of opaque multi-call binaries like busybox and toybox that obscure which applet actually runs, bypassing exec approval mechanisms.
To detect this vulnerability on your system, you should check if your OpenClaw version is between 2026.2.23 and before 2026.4.12, as these versions are affected.
You can also audit your system for usage of busybox and toybox applets in execution contexts where exec approval is enforced, as these are the vectors exploited.
While specific detection commands are not provided in the resources, a general approach includes:
- Check OpenClaw version: `openclaw --version` or check package manager for installed version.
- Search for busybox or toybox usage in scripts or execution logs: `grep -r 'busybox' /path/to/scripts` or `grep -r 'toybox' /path/to/scripts`.
- Monitor process execution to detect if busybox or toybox is invoked in unexpected ways, for example using `ps aux | grep busybox` or `ps aux | grep toybox`.
- Review exec approval or security logs for anomalies related to multi-call binary executions.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to upgrade OpenClaw to version 2026.4.12 or newer, as this version includes a fix that treats busybox and toybox as opaque mutable script runners and enforces a fail-closed policy.
The fix removes busybox and toybox from the list of interpreter-like safe binaries, preventing their unsafe use and blocking attempts to bypass exec approval.
Additionally, ensure that your runtime policies and exec approval mechanisms are updated to reject or flag usage of busybox and toybox applets.
If upgrading immediately is not possible, consider auditing and restricting execution of busybox and toybox binaries and their applets to trusted contexts only.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the CVE-2026-43530 vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.