CVE-2026-32010

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safe-bin configuration when sort is manually added to tools.exec.safeBins. Attackers can invoke sort with the --compress-program flag to execute arbitrary external programs without operator approval in allowlist mode with ask=on-miss enabled.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

23 Mar 2026, 18:29

Type Values Removed Values Added
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/57fbbaebca4d34d17549accf6092ae26eb7b605c - () https://github.com/openclaw/openclaw/commit/57fbbaebca4d34d17549accf6092ae26eb7b605c - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-4gc7-qcvf-38wg - () https://github.com/openclaw/openclaw/security/advisories/GHSA-4gc7-qcvf-38wg - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-sort-compress-program-parameter - () https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-sort-compress-program-parameter - Third Party Advisory
Summary
  • (es) Las versiones de OpenClaw anteriores a la 2026.2.22 contienen una vulnerabilidad de omisión de lista de permitidos en la configuración de safe-bin cuando sort se añade manualmente a tools.exec.safeBins. Los atacantes pueden invocar sort con el indicador --compress-program para ejecutar programas externos arbitrarios sin la aprobación del operador en modo de lista de permitidos con ask=on-miss habilitado.
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-23 18:29


NVD link : CVE-2026-32010

Mitre link : CVE-2026-32010

CVE.ORG link : CVE-2026-32010


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')