← Retour aux CVEs
CVE-2026-32003
MEDIUM6.6
Description
OpenClaw versions prior to 2026.2.22 contain an environment variable injection vulnerability in the system.run function that allows attackers to bypass command allowlist restrictions via SHELLOPTS and PS4 environment variables. An attacker who can invoke system.run with request-scoped environment variables can execute arbitrary shell commands outside the intended allowlisted command body through bash xtrace expansion.
Details CVE
Score CVSS v3.16.6
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisHIGH
Interaction utilisateurNONE
Publie3/19/2026
Derniere modification3/23/2026
Sourcenvd
Observations honeypot0
Produits affectes
openclaw:openclaw
Faiblesses (CWE)
CWE-78
References
https://github.com/openclaw/openclaw/commit/e80c803fa887f9699ad87a9e906ab5c1ff85bd9a(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-2fgq-7j6h-9rm4(disclosure@vulncheck.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.