OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror mode access can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks.
References
Configurations
History
01 May 2026, 20:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/c02ee8a3a4cb390b23afdf21317aa8b2096854d1 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-42mx-vp8m-j7qh - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openshell-arbitrary-code-execution-via-mirror-mode-sandbox-file-conversion - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-05-01 20:23
NVD link : CVE-2026-41355
Mitre link : CVE-2026-41355
CVE.ORG link : CVE-2026-41355
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
