top of page
perceptive_background_267k.jpg

OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environ…

Published:

4 maart 2026 om 23:00:00

Alert date:

5 maart 2026 om 23:13:13

Source:

nvd.nist.gov

Click to open the original link from this advisory

Supply Chain & Dependencies, Security Tools

OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability (CVE-2026-29610) that allows attackers to execute arbitrary commands by manipulating PATH environment variables. The vulnerability can be exploited through node-host execution or project-local bootstrapping by attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories. Attackers can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page