CVE-2026-32063

OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vulnerability in systemd unit file generation where attacker-controlled environment values are not validated for CR/LF characters, allowing newline injection to break out of Environment= lines and inject arbitrary systemd directives. An attacker who can influence config.env.vars and trigger service install or restart can execute arbitrary commands with the privileges of the OpenClaw gateway service user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

16 Mar 2026, 17:52

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/61f646c41fb43cd87ed48f9125b4718a30d38e84 - () https://github.com/openclaw/openclaw/commit/61f646c41fb43cd87ed48f9125b4718a30d38e84 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-vffc-f7r7-rx2w - () https://github.com/openclaw/openclaw/security/advisories/GHSA-vffc-f7r7-rx2w - Exploit, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-command-injection-via-newline-in-systemd-unit-generation - () https://www.vulncheck.com/advisories/openclaw-command-injection-via-newline-in-systemd-unit-generation - Broken Link
Summary
  • (es) La versión 2026.2.19-2 de OpenClaw anterior a la 2026.2.21 contiene una vulnerabilidad de inyección de comandos en la generación de archivos de unidad de systemd, donde los valores de entorno controlados por el atacante no se validan en busca de caracteres CR/LF, lo que permite la inyección de nuevas líneas para escapar de las líneas Environment= e inyectar directivas arbitrarias de systemd. Un atacante que puede influir en config.env.vars y activar la instalación o el reinicio del servicio puede ejecutar comandos arbitrarios con los privilegios del usuario del servicio de pasarela de OpenClaw.
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

11 Mar 2026, 15:16

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-vffc-f7r7-rx2w - () https://github.com/openclaw/openclaw/security/advisories/GHSA-vffc-f7r7-rx2w -

11 Mar 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-11 14:16

Updated : 2026-03-16 17:52


NVD link : CVE-2026-32063

Mitre link : CVE-2026-32063

CVE.ORG link : CVE-2026-32063


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')