CVE-2026-32000

OpenClaw versions prior to 2026.2.19 contain a command injection vulnerability in the Lobster extension tool execution that uses Windows shell fallback with shell: true after spawn failures. Attackers can inject shell metacharacters in command arguments to execute arbitrary commands when subprocess launch fails with EINVAL or ENOENT errors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

25 Mar 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : 7.1
Summary
  • (es) Las versiones de OpenClaw anteriores a 2026.2.19 contienen una vulnerabilidad de inyección de comandos en la ejecución de la herramienta de la extensión Lobster que utiliza un mecanismo de reserva de shell de Windows con shell: true después de fallos de creación de procesos. Los atacantes pueden inyectar metacaracteres de shell en los argumentos de comando para ejecutar comandos arbitrarios cuando el lanzamiento del subproceso falla con errores EINVAL o ENOENT.

19 Mar 2026, 18:47

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/ba7be018da354ea9f803ed356d20464df0437916 - () https://github.com/openclaw/openclaw/commit/ba7be018da354ea9f803ed356d20464df0437916 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-7fcc-cw49-xm78 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-7fcc-cw49-xm78 - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-command-injection-via-windows-shell-fallback-in-lobster-tool-execution - () https://www.vulncheck.com/advisories/openclaw-command-injection-via-windows-shell-fallback-in-lobster-tool-execution - Third Party Advisory

19 Mar 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 02:16

Updated : 2026-03-25 15:16


NVD link : CVE-2026-32000

Mitre link : CVE-2026-32000

CVE.ORG link : CVE-2026-32000


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')