OpenClaw versions prior to 2026.2.19 contain a local command injection vulnerability in Windows scheduled task script generation due to unsafe handling of cmd metacharacters and expansion-sensitive characters in gateway.cmd files. Local attackers with control over service script generation arguments can inject arbitrary commands by providing metacharacter-only values or CR/LF sequences that execute unintended code in the scheduled task context.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
19 Mar 2026, 18:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/280c6b117b2f0e24f398e5219048cd4cc3b82396 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-mqr9-vqhq-3jxw - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-local-command-injection-via-unsafe-cmd-argument-handling-in-windows-scheduled-task - Third Party Advisory | |
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
|
| First Time |
Openclaw openclaw
Microsoft windows Microsoft Openclaw |
19 Mar 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 02:16
Updated : 2026-03-19 18:20
NVD link : CVE-2026-31994
Mitre link : CVE-2026-31994
CVE.ORG link : CVE-2026-31994
JSON object : View
Products Affected
microsoft
- windows
openclaw
- openclaw
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
