Loading
Generated remediation guidance and an executive summary. No account required.
OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that should require explicit user approval, circumventing the intended security boundary.
No affected products information available.
Use CWE-636 to widen CVE-2026-42423 into its surrounding weakness, vendor, and product context.