top of page
perceptive_background_267k.jpg

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run exec analysis that fails to unwrap env and shell-dispatch wrapper c…

Published:

18 maart 2026 om 23:00:00

Alert date:

19 maart 2026 om 03:02:30

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

OpenClaw versions prior to 2026.2.22 contain a critical allowlist bypass vulnerability in system.run exec analysis. The vulnerability fails to properly unwrap environment and shell-dispatch wrapper chains, allowing attackers to route execution through wrapper binaries like 'env bash'. This enables attackers to smuggle malicious payloads that satisfy allowlist entries while executing non-allowlisted commands. The vulnerability affects the security control mechanism designed to restrict command execution, potentially leading to unauthorized code execution and system compromise.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page