Critical (9.9)

CVE-2026-28363: In OpenClaw

CVE-2026-28363

In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free executio...

Overview

A critical security vulnerability has been identified in OpenClaw, a software management tool, affecting versions prior to 2026.2.23. This flaw allows attackers to bypass critical security controls, potentially leading to unauthorized command execution on affected systems.

Vulnerability Explanation

OpenClaw includes a security feature designed to restrict which system commands can be executed. This feature uses an “allowlist” to only permit specific, safe commands. One such restricted command is sort, which has a dangerous option (--compress-program) that can be used to run other programs.

The vulnerability exists because the validation check was too strict. It only blocked the exact string --compress-program. An attacker can bypass this by using a shortened, but functionally identical, GNU-style abbreviation like --compress-prog. The system’s sort command treats both forms the same way, but OpenClaw’s security check did not, allowing the malicious command to proceed without the required approval.

Potential Impact

This is a critical-severity vulnerability (CVSS: 9.9). By exploiting this bypass, an attacker with basic access to a system running a vulnerable version of OpenClaw could execute arbitrary commands with the same privileges as the OpenClaw process. This could lead to:

  • Full system compromise
  • Data theft or destruction
  • Installation of malware or backdoors
  • Use of the system as a foothold for attacking other network resources

Remediation and Mitigation

Immediate Action Required:

  1. Upgrade: The primary fix is to update OpenClaw to version 2026.2.23 or later. This update corrects the validation logic to properly catch all dangerous option variants.
  2. Patch Management: If an immediate upgrade is not possible, apply any official vendor patches specifically addressing CVE-2026-28363.
  3. Temporary Mitigation: As a temporary workaround, consider disabling the affected tools.exec functionality or implementing strict network-level access controls to systems running vulnerable versions of OpenClaw until they can be patched.
  4. Audit: Review systems for any unauthorized activity or unexpected processes that may indicate prior exploitation of this vulnerability.

All users and administrators of OpenClaw should prioritize applying the update to prevent potential system compromise.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-28363?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.