CVE-2026-28463

OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

09 Mar 2026, 17:23

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/77b89719d5b7e271f48b6f49e334a8b991468c3b - () https://github.com/openclaw/openclaw/commit/77b89719d5b7e271f48b6f49e334a8b991468c3b - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-xvhf-x56f-2hpp - () https://github.com/openclaw/openclaw/security/advisories/GHSA-xvhf-x56f-2hpp - Vendor Advisory, Patch
References () https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-shell-expansion-in-safe-bins-allowlist - () https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-shell-expansion-in-safe-bins-allowlist - Third Party Advisory
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

09 Mar 2026, 13:36

Type Values Removed Values Added
Summary
  • (es) La validación de la lista de permitidos de aprobaciones de ejecución de OpenClaw comprueba los tokens argv pre-expansión, pero la ejecución utiliza la expansión real del shell, permitiendo que binarios seguros como head, tail o grep lean archivos locales arbitrarios a través de patrones glob o variables de entorno. Los llamadores autorizados o los ataques de inyección de prompt pueden exploit esto para divulgar archivos legibles por el proceso de gateway o de nodo cuando la ejecución del host está habilitada en modo de lista de permitidos.

05 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 22:16

Updated : 2026-03-09 17:23


NVD link : CVE-2026-28463

Mitre link : CVE-2026-28463

CVE.ORG link : CVE-2026-28463


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')