CVE-2026-32052

Published: Mar 21, 2026 Last Modified: Mar 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,8
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: active
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM 6,4
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: high

Description

AI Translation Available

OpenClaw versions prior to 2026.2.24 contain a command injection vulnerability in the system.run shell-wrapper that allows attackers to execute hidden commands by injecting positional argv carriers after inline shell payloads. Attackers can craft misleading approval text while executing arbitrary commands through trailing positional arguments that bypass display context validation.

436

Interpretation Conflict

Incomplete
Common Consequences
Security Scopes Affected:
Integrity Other
Potential Impacts:
Unexpected State Varies By Context
Applicable Platforms
All platforms may be affected
View CWE Details
https://github.com/openclaw/openclaw/commit/0f0a680d3df81739ea5088a2f88e65f938b…
https://github.com/openclaw/openclaw/commit/55cf92578d266987e390c4bf688196af98e…
https://github.com/openclaw/openclaw/security/advisories/GHSA-6rcp-vxwf-3mfp
https://www.vulncheck.com/advisories/openclaw-hidden-command-execution-via-shel…