← Back to CVEs
CVE-2026-32003
MEDIUM6.6
Description
OpenClaw versions prior to 2026.2.22 contain an environment variable injection vulnerability in the system.run function that allows attackers to bypass command allowlist restrictions via SHELLOPTS and PS4 environment variables. An attacker who can invoke system.run with request-scoped environment variables can execute arbitrary shell commands outside the intended allowlisted command body through bash xtrace expansion.
CVE Details
CVSS v3.1 Score6.6
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredHIGH
User InteractionNONE
Published3/19/2026
Last Modified3/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
openclaw:openclaw
Weaknesses (CWE)
CWE-78
References
https://github.com/openclaw/openclaw/commit/e80c803fa887f9699ad87a9e906ab5c1ff85bd9a(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-2fgq-7j6h-9rm4(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.