


Perceptive Security
SOC/SIEM Consultancy

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run exec analysis that fails to unwrap env and shell-dispatch wrapper c…
Published:
18 maart 2026 om 23:00:00
Alert date:
19 maart 2026 om 03:02:30
Source:
nvd.nist.gov
Security Tools
OpenClaw versions prior to 2026.2.22 contain a critical allowlist bypass vulnerability in system.run exec analysis. The vulnerability fails to properly unwrap environment and shell-dispatch wrapper chains, allowing attackers to route execution through wrapper binaries like 'env bash'. This enables attackers to smuggle malicious payloads that satisfy allowlist entries while executing non-allowlisted commands. The vulnerability affects the security control mechanism designed to restrict command execution, potentially leading to unauthorized code execution and system compromise.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-27566
https://github.com/openclaw/openclaw/commit/2b63592be57782c8946e521bc81286933f0f99c7
https://github.com/openclaw/openclaw/security/advisories/GHSA-jj82-76v6-933r
https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-wrapper-binary-unwrapping-in-system-run
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
