CVE-2026-28363

In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

27 Feb 2026, 19:13

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-3c6h-g97w-fg78 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-3c6h-g97w-fg78 - Vendor Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

27 Feb 2026, 14:06

Type Values Removed Values Added
Summary
  • (es) En OpenClaw antes de 2026.2.23, la validación de tools.exec.safeBins para sort podría ser eludida a través de abreviaturas de opciones largas de GNU (como --compress-prog) en modo de lista de permitidos, lo que llevaba a rutas de ejecución sin aprobación que estaban destinadas a requerir aprobación. Solo una cadena exacta como --compress-program era denegada.

27 Feb 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 04:16

Updated : 2026-02-27 19:13


NVD link : CVE-2026-28363

Mitre link : CVE-2026-28363

CVE.ORG link : CVE-2026-28363


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-184

Incomplete List of Disallowed Inputs