CVE-2026-31992

OpenClaw versions prior to 2026.2.23 contain an allowlist bypass vulnerability in system.run guardrails that allows authenticated operators to execute unintended commands. When /usr/bin/env is allowlisted, attackers can use env -S to bypass policy analysis and execute shell wrapper payloads at runtime.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

19 Mar 2026, 19:00

Type Values Removed Values Added
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/commit/3f923e831364d83d0f23499ee49961de334cf58b - () https://github.com/openclaw/openclaw/commit/3f923e831364d83d0f23499ee49961de334cf58b - Patch
References () https://github.com/openclaw/openclaw/commit/a1c4bf07c6baad3ef87a0e710fe9aef127b1f606 - () https://github.com/openclaw/openclaw/commit/a1c4bf07c6baad3ef87a0e710fe9aef127b1f606 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-48wf-g7cp-gr3m - () https://github.com/openclaw/openclaw/security/advisories/GHSA-48wf-g7cp-gr3m - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-allowlist-exec-guard-bypass-via-env-s - () https://www.vulncheck.com/advisories/openclaw-allowlist-exec-guard-bypass-via-env-s - Third Party Advisory

19 Mar 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 02:16

Updated : 2026-03-19 19:00


NVD link : CVE-2026-31992

Mitre link : CVE-2026-31992

CVE.ORG link : CVE-2026-31992


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-184

Incomplete List of Disallowed Inputs