OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror mode access can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks.
References
Configurations
History
01 May 2026, 20:23
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/c02ee8a3a4cb390b23afdf21317aa8b2096854d1 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-42mx-vp8m-j7qh - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openshell-arbitrary-code-execution-via-mirror-mode-sandbox-file-conversion - Third Party Advisory |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-05-01 20:23
NVD link : CVE-2026-41355
Mitre link : CVE-2026-41355
CVE.ORG link : CVE-2026-41355
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
