OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a command injection vulnerability in the Lobster extension's Windows shell fallback mechanism that allows attackers to inject arbitrary commands through tool-provided arguments. When spawn failures trigger shell fallback with shell: true, attackers can exploit cmd.exe command interpretation to execute malicious commands by controlling workflow arguments.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
19 Mar 2026, 18:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Microsoft windows Microsoft Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/ba7be018da354ea9f803ed356d20464df0437916 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-fg3m-vhrr-8gj6 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-command-injection-via-windows-shell-fallback-in-lobster-extension - Third Party Advisory | |
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
19 Mar 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 02:16
Updated : 2026-03-19 18:17
NVD link : CVE-2026-31995
Mitre link : CVE-2026-31995
CVE.ORG link : CVE-2026-31995
JSON object : View
Products Affected
microsoft
- windows
openclaw
- openclaw
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
