


Perceptive Security
SOC/SIEM Consultancy

OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environ…
Published:
4 maart 2026 om 23:00:00
Alert date:
5 maart 2026 om 23:13:13
Source:
nvd.nist.gov
Supply Chain & Dependencies, Security Tools
OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability (CVE-2026-29610) that allows attackers to execute arbitrary commands by manipulating PATH environment variables. The vulnerability can be exploited through node-host execution or project-local bootstrapping by attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories. Attackers can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-29610
https://github.com/openclaw/openclaw/commit/013e8f6b3be3333a229a066eef26a45fec47ffcc
https://github.com/openclaw/openclaw/security/advisories/GHSA-jqpq-mgvm-f9r6
https://www.vulncheck.com/advisories/openclaw-command-hijacking-via-unsafe-path-handling
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
