Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-32056 (GCVE-0-2026-32056)
Vulnerability from cvelistv5 – Published: 2026-03-21 00:42 – Updated: 2026-03-23 18:48 X_Open Source- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
| URL | Tags |
|---|---|
| https://github.com/openclaw/openclaw/security/adv… | third-party-advisory |
| https://github.com/openclaw/openclaw/commit/c2c71… | patch |
| https://www.vulncheck.com/advisories/openclaw-rem… | third-party-advisory |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-32056",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-23T18:47:57.179481Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-23T18:48:41.026Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageURL": "pkg:npm/openclaw",
"product": "OpenClaw",
"vendor": "OpenClaw",
"versions": [
{
"lessThan": "2026.2.22",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2026.2.22",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "2026.2.22",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "tdjackey"
}
],
"datePublic": "2026-02-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027) (CWE-78)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-21T00:42:27.152Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "GitHub Security Advisory (GHSA-xgf2-vxv2-rrmg)",
"tags": [
"third-party-advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg"
},
{
"name": "Patch Commit",
"tags": [
"patch"
],
"url": "https://github.com/openclaw/openclaw/commit/c2c7114ed39a547ab6276e1e933029b9530ee906"
},
{
"name": "VulnCheck Advisory: OpenClaw \u003c 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in system.run",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-shell-startup-environment-variable-injection-in-system-run"
}
],
"tags": [
"x_open-source"
],
"title": "OpenClaw \u003c 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in system.run",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2026-32056",
"datePublished": "2026-03-21T00:42:27.152Z",
"dateReserved": "2026-03-10T19:48:47.516Z",
"dateUpdated": "2026-03-23T18:48:41.026Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-32056",
"date": "2026-05-14",
"epss": "0.00165",
"percentile": "0.37072"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-32056\",\"sourceIdentifier\":\"disclosure@vulncheck.com\",\"published\":\"2026-03-21T01:17:09.103\",\"lastModified\":\"2026-03-23T18:59:59.843\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"2026.2.22\",\"matchCriteriaId\":\"6EA3E555-7328-4665-9FBC-BF4357239EDF\"}]}]}],\"references\":[{\"url\":\"https://github.com/openclaw/openclaw/commit/c2c7114ed39a547ab6276e1e933029b9530ee906\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-shell-startup-environment-variable-injection-in-system-run\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-32056\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-23T18:47:57.179481Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-23T18:48:26.597Z\"}}], \"cna\": {\"tags\": [\"x_open-source\"], \"title\": \"OpenClaw \u003c 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in system.run\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"tdjackey\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 7.7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"OpenClaw\", \"product\": \"OpenClaw\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2026.2.22\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"2026.2.22\", \"versionType\": \"semver\"}], \"packageURL\": \"pkg:npm/openclaw\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-02-23T00:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg\", \"name\": \"GitHub Security Advisory (GHSA-xgf2-vxv2-rrmg)\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/openclaw/openclaw/commit/c2c7114ed39a547ab6276e1e933029b9530ee906\", \"name\": \"Patch Commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-shell-startup-environment-variable-injection-in-system-run\", \"name\": \"VulnCheck Advisory: OpenClaw \u003c 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in system.run\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"vulncheck\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-78\", \"description\": \"Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027) (CWE-78)\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"2026.2.22\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"shortName\": \"VulnCheck\", \"dateUpdated\": \"2026-03-21T00:42:27.152Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-32056\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-23T18:48:41.026Z\", \"dateReserved\": \"2026-03-10T19:48:47.516Z\", \"assignerOrgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"datePublished\": \"2026-03-21T00:42:27.152Z\", \"assignerShortName\": \"VulnCheck\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-RJ39-33V7-9XRQ
Vulnerability from github – Published: 2026-03-21 03:31 – Updated: 2026-03-24 19:06Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-xgf2-vxv2-rrmg. This link is maintained to preserve external references.
Original Description
OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c 2026.2.22"
},
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-78"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-24T19:06:06Z",
"nvd_published_at": "2026-03-21T01:17:09Z",
"severity": "HIGH"
},
"details": "## Duplicate Advisory\n\nThis advisory has been withdrawn because it is a duplicate of GHSA-xgf2-vxv2-rrmg. This link is maintained to preserve external references.\n\n## Original Description\nOpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed.",
"id": "GHSA-rj39-33v7-9xrq",
"modified": "2026-03-24T19:06:06Z",
"published": "2026-03-21T03:31:14Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32056"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/c2c7114ed39a547ab6276e1e933029b9530ee906"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-shell-startup-environment-variable-injection-in-system-run"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
],
"summary": "Duplicate Advisory: OpenClaw\u0027s shell startup env injection bypasses system.run allowlist intent (RCE class)",
"withdrawn": "2026-03-24T19:06:06Z"
}
GHSA-XGF2-VXV2-RRMG
Vulnerability from github – Published: 2026-03-03 22:12 – Updated: 2026-03-30 13:37Summary
system.run environment sanitization allowed shell-startup env overrides (HOME, ZDOTDIR) that can execute attacker-controlled startup files before allowlist-evaluated command bodies.
Affected Packages / Versions
- Package:
openclaw(npm) - Affected:
<= 2026.2.21-2(latest published vulnerable version) - Planned patched version:
>= 2026.2.22
Technical Details
In affected versions:
- Env sanitization blocked many dangerous keys, but not startup-sensitive override keys (HOME, ZDOTDIR) in host exec env paths.
- Shell-wrapper analysis for allowlist mode models command bodies, but not shell startup side effects.
- Runtime execution used sanitized env, so attacker-provided startup-key overrides could run hidden startup payloads first.
Observed exploit vectors:
- HOME + bash -lc + malicious .bash_profile
- ZDOTDIR + zsh -c + malicious .zshenv
Fix Commit(s)
c2c7114ed39a547ab6276e1e933029b9530ee906
Release Process Note
patched_versions is pre-set to the planned next release (>= 2026.2.22). After the npm release is published, this advisory can be published directly.
OpenClaw thanks @tdjackey for reporting.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.2.22"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-32056"
],
"database_specific": {
"cwe_ids": [
"CWE-15",
"CWE-78"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T22:12:51Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "### Summary\n`system.run` environment sanitization allowed shell-startup env overrides (`HOME`, `ZDOTDIR`) that can execute attacker-controlled startup files before allowlist-evaluated command bodies.\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected: `\u003c= 2026.2.21-2` (latest published vulnerable version)\n- Planned patched version: `\u003e= 2026.2.22`\n\n### Technical Details\nIn affected versions:\n- Env sanitization blocked many dangerous keys, but not startup-sensitive override keys (`HOME`, `ZDOTDIR`) in host exec env paths.\n- Shell-wrapper analysis for allowlist mode models command bodies, but not shell startup side effects.\n- Runtime execution used sanitized env, so attacker-provided startup-key overrides could run hidden startup payloads first.\n\nObserved exploit vectors:\n- `HOME` + `bash -lc` + malicious `.bash_profile`\n- `ZDOTDIR` + `zsh -c` + malicious `.zshenv`\n\n### Fix Commit(s)\n- `c2c7114ed39a547ab6276e1e933029b9530ee906`\n\n### Release Process Note\n`patched_versions` is pre-set to the planned next release (`\u003e= 2026.2.22`). After the npm release is published, this advisory can be published directly.\n\nOpenClaw thanks @tdjackey for reporting.",
"id": "GHSA-xgf2-vxv2-rrmg",
"modified": "2026-03-30T13:37:58Z",
"published": "2026-03-03T22:12:51Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32056"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/c2c7114ed39a547ab6276e1e933029b9530ee906"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-shell-startup-environment-variable-injection-in-system-run"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenClaw\u0027s shell startup env injection bypasses system.run allowlist intent (RCE class)"
}
FKIE_CVE-2026-32056
Vulnerability from fkie_nvd - Published: 2026-03-21 01:17 - Updated: 2026-03-23 18:599.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "6EA3E555-7328-4665-9FBC-BF4357239EDF",
"versionEndExcluding": "2026.2.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed."
},
{
"lang": "es",
"value": "Las versiones de OpenClaw anteriores a la 2026.2.22 no sanean las variables de entorno de inicio de shell HOME y ZDOTDIR en la funci\u00f3n system.run, lo que permite a los atacantes eludir las protecciones de la lista de comandos permitidos. Los atacantes remotos pueden inyectar archivos de inicio maliciosos como .bash_profile o .zshenv para lograr ejecuci\u00f3n de c\u00f3digo arbitrario antes de que se ejecuten los comandos evaluados por la lista de permitidos."
}
],
"id": "CVE-2026-32056",
"lastModified": "2026-03-23T18:59:59.843",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9,
"source": "disclosure@vulncheck.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-03-21T01:17:09.103",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Patch"
],
"url": "https://github.com/openclaw/openclaw/commit/c2c7114ed39a547ab6276e1e933029b9530ee906"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-shell-startup-environment-variable-injection-in-system-run"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
]
}
CNVD-2026-16044
Vulnerability from cnvd - Published: 2026-04-03厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/openclaw/openclaw/releases
| Name | OpenClaw OpenClaw <2026.2.22 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2026-32056",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2026-32056"
}
},
"description": "OpenClaw\u662fOpenClaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\n\nOpenClaw\u5b58\u5728\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u672a\u80fd\u5bf9system.run\u51fd\u6570\u4e2d\u7684shell\u542f\u52a8\u73af\u5883\u53d8\u91cfHOME\u548cZDOTDIR\u8fdb\u884c\u8fc7\u6ee4\u9020\u6210\u7684\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/openclaw/openclaw/releases",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2026-16044",
"openTime": "2026-04-03",
"patchDescription": "OpenClaw\u662fOpenClaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\r\n\r\nOpenClaw\u5b58\u5728\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u672a\u80fd\u5bf9system.run\u51fd\u6570\u4e2d\u7684shell\u542f\u52a8\u73af\u5883\u53d8\u91cfHOME\u548cZDOTDIR\u8fdb\u884c\u8fc7\u6ee4\u9020\u6210\u7684\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "OpenClaw\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2026-16044\uff09\u7684\u8865\u4e01",
"products": {
"product": "OpenClaw OpenClaw \u003c2026.2.22"
},
"referenceLink": "https://github.com/openclaw/openclaw/commit/c2c7114ed39a547ab6276e1e933029b9530ee906",
"serverity": "\u9ad8",
"submitTime": "2026-03-26",
"title": "OpenClaw\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2026-16044\uff09"
}
WID-SEC-W-2026-0472
Vulnerability from csaf_certbund - Published: 2026-02-22 23:00 - Updated: 2026-04-12 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenClaw ist ein pers\u00f6nlicher KI-Assistent zur Ausf\u00fchrung auf eigenen Ger\u00e4ten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um beliebigen Programmcode auszuf\u00fchren, sich erh\u00f6hte Berechtigungen zu verschaffen, Daten zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen oder andere nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0472 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0472.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0472 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0472"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-25gx-x37c-7pph"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2fgq-7j6h-9rm4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2hm8-rqrm-xfjq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2mc2-g238-722j"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2prf-9cw7-fq62"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2rgf-hm63-5qph"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3cvx-236h-m9fj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3x3x-h76w-hp98"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3xfw-4pmr-4xc5"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-43x4-g22p-3hrq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-45cg-2683-gfmq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4cqv-h74h-93j4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4gc7-qcvf-38wg"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4rqq-w8v4-7p47"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-56pc-6hvp-4gv4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5847-rm3g-23mw"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5ghc-98wh-gwwf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5h2c-8v84-qpvr"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5mx2-2mgw-x8rm"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5v6x-rfc3-7qfr"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-62f6-mrcj-v8h5"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-65rx-fvh6-r4h2"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-6j27-pc5c-m8w8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-74xj-763f-264w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7fcc-cw49-xm78"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-82g8-464f-2mv7"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8cp7-rp8r-mg77"
},
{
"category": "external",
"summary": "OpenClaw Security A)dvisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8fmp-37rc-p5g7"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9p38-94jf-hgjj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cjv3-m589-v3rx"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f6h3-846h-2r8w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f8mp-vj46-cq8v"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fg3m-vhrr-8gj6"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gq83-8q7q-9hfx"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jj82-76v6-933r"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jjgj-cpp9-cvpv"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jq4x-98m3-ggq6"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jwf4-8wf4-jf2m"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mfg5-7q5g-f37j"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mqr9-vqhq-3jxw"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rx3g-mvc3-qfjf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rxxp-482v-7mrh"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v3j7-34xh-6g3w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vffc-f7r7-rx2w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vmqr-rc7x-3446"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vvjh-f6p9-5vcf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w7j5-j98m-w679"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w9cg-v44m-4qv8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wpph-cjgr-7c39"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x2g4-7mj7-2hhj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x9cf-3w63-rpq9"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xwcr-v472-8hhr"
}
],
"source_lang": "en-US",
"title": "OpenClaw: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-12T22:00:00.000+00:00",
"generator": {
"date": "2026-04-13T06:09:20.312+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0472",
"initial_release_date": "2026-02-22T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-2026-32061, CVE-2026-32062, CVE-2026-32063 erg\u00e4nzt"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "4",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "5",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2026-03-22T23:00:00.000+00:00",
"number": "6",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "7",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "8",
"summary": "Referenz(en) aufgenommen: GHSA-QWMF-95R9-GX9X"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "9",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2026-04-12T22:00:00.000+00:00",
"number": "10",
"summary": "CVE-2026-3689, CVE-2026-3690 erg\u00e4nzt"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2026.2.22",
"product": {
"name": "Open Source OpenClaw \u003c2026.2.22",
"product_id": "T051067"
}
},
{
"category": "product_version",
"name": "2026.2.22",
"product": {
"name": "Open Source OpenClaw 2026.2.22",
"product_id": "T051067-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openclaw:openclaw:2026.2.22"
}
}
}
],
"category": "product_name",
"name": "OpenClaw"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-22168",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22168"
},
{
"cve": "CVE-2026-22169",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22169"
},
{
"cve": "CVE-2026-22170",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22170"
},
{
"cve": "CVE-2026-22174",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22174"
},
{
"cve": "CVE-2026-22177",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22177"
},
{
"cve": "CVE-2026-22179",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22179"
},
{
"cve": "CVE-2026-27158",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27158"
},
{
"cve": "CVE-2026-27159",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27159"
},
{
"cve": "CVE-2026-27164",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27164"
},
{
"cve": "CVE-2026-27165",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27165"
},
{
"cve": "CVE-2026-27209",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27209"
},
{
"cve": "CVE-2026-27524",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27524"
},
{
"cve": "CVE-2026-27566",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27566"
},
{
"cve": "CVE-2026-28455",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-28455"
},
{
"cve": "CVE-2026-29607",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-29607"
},
{
"cve": "CVE-2026-31994",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-31994"
},
{
"cve": "CVE-2026-31995",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-31995"
},
{
"cve": "CVE-2026-32000",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32000"
},
{
"cve": "CVE-2026-32003",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32003"
},
{
"cve": "CVE-2026-32008",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32008"
},
{
"cve": "CVE-2026-32010",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32010"
},
{
"cve": "CVE-2026-32017",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32017"
},
{
"cve": "CVE-2026-32018",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32018"
},
{
"cve": "CVE-2026-32019",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32019"
},
{
"cve": "CVE-2026-32020",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32020"
},
{
"cve": "CVE-2026-32022",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32022"
},
{
"cve": "CVE-2026-32024",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32024"
},
{
"cve": "CVE-2026-32029",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32029"
},
{
"cve": "CVE-2026-32030",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32030"
},
{
"cve": "CVE-2026-32032",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32032"
},
{
"cve": "CVE-2026-32034",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32034"
},
{
"cve": "CVE-2026-32039",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32039"
},
{
"cve": "CVE-2026-32045",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32045"
},
{
"cve": "CVE-2026-32046",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32046"
},
{
"cve": "CVE-2026-32049",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32049"
},
{
"cve": "CVE-2026-32056",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32056"
},
{
"cve": "CVE-2026-32061",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32061"
},
{
"cve": "CVE-2026-32062",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32062"
},
{
"cve": "CVE-2026-32063",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32063"
},
{
"cve": "CVE-2026-32064",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32064"
},
{
"cve": "CVE-2026-32896",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32896"
},
{
"cve": "CVE-2026-32897",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32897"
},
{
"cve": "CVE-2026-32900",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32900"
},
{
"cve": "CVE-2026-32907",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32907"
},
{
"cve": "CVE-2026-32908",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32908"
},
{
"cve": "CVE-2026-3689",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-3689"
},
{
"cve": "CVE-2026-3690",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-3690"
},
{
"cve": "CVE-2026-4039",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-4039"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.