OpenClaw versions prior to 2026.2.22 contain an arbitrary shell execution vulnerability in shell environment fallback that trusts the unvalidated SHELL path from the host environment. An attacker with local environment access can inject a malicious SHELL variable to execute arbitrary commands with the privileges of the OpenClaw process.
References
Configurations
History
25 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| Summary |
|
23 Mar 2026, 14:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/25e89cc86338ef475d26be043aa541dfdb95e52a - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-f8mp-vj46-cq8v - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-arbitrary-shell-execution-via-unvalidated-shell-environment-variable - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
19 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 22:16
Updated : 2026-03-25 15:16
NVD link : CVE-2026-32032
Mitre link : CVE-2026-32032
CVE.ORG link : CVE-2026-32032
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-426
Untrusted Search Path
