top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage attachment staging flow that allows attackers to execute arbitrary c…

Published:

30 maart 2026 om 22:00:00

Alert date:

31 maart 2026 om 13:04:59

Source:

nvd.nist.gov

Click to open the original link from this advisory

Email & Messaging, Enterprise Applications

OpenClaw versions before 2026.3.13 contain a critical remote command injection vulnerability in the iMessage attachment staging flow. The flaw allows attackers to execute arbitrary commands on configured remote hosts by exploiting unsanitized remote attachment paths containing shell metacharacters. These malicious paths are passed directly to the SCP remote operand without proper validation. The vulnerability is only exploitable when remote attachment staging is enabled in the OpenClaw configuration. This represents a significant security risk for organizations using affected OpenClaw versions with remote attachment staging functionality.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page