CVE-2026-32052
MEDIUM
5,8
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: active
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM
6,4
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: high
Description
AI Translation Available
OpenClaw versions prior to 2026.2.24 contain a command injection vulnerability in the system.run shell-wrapper that allows attackers to execute hidden commands by injecting positional argv carriers after inline shell payloads. Attackers can craft misleading approval text while executing arbitrary commands through trailing positional arguments that bypass display context validation.
436
Interpretation Conflict
IncompleteCommon Consequences
Security Scopes Affected:
Integrity
Other
Potential Impacts:
Unexpected State
Varies By Context
Applicable Platforms
All platforms may be affected
https://github.com/openclaw/openclaw/commit/0f0a680d3df81739ea5088a2f88e65f938b…
https://github.com/openclaw/openclaw/commit/55cf92578d266987e390c4bf688196af98e…
https://github.com/openclaw/openclaw/security/advisories/GHSA-6rcp-vxwf-3mfp
https://www.vulncheck.com/advisories/openclaw-hidden-command-execution-via-shel…