CVE-2026-41355

OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror mode access can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

01 May 2026, 20:23

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/c02ee8a3a4cb390b23afdf21317aa8b2096854d1 - () https://github.com/openclaw/openclaw/commit/c02ee8a3a4cb390b23afdf21317aa8b2096854d1 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-42mx-vp8m-j7qh - () https://github.com/openclaw/openclaw/security/advisories/GHSA-42mx-vp8m-j7qh - Vendor Advisory
References () https://www.vulncheck.com/advisories/openshell-arbitrary-code-execution-via-mirror-mode-sandbox-file-conversion - () https://www.vulncheck.com/advisories/openshell-arbitrary-code-execution-via-mirror-mode-sandbox-file-conversion - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

23 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 22:16

Updated : 2026-05-01 20:23


NVD link : CVE-2026-41355

Mitre link : CVE-2026-41355

CVE.ORG link : CVE-2026-41355


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere