Windows Vulnerability (CVE-2026-28391)
CVE-2026-28391
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attack...
Overview
A critical security vulnerability has been identified in OpenClaw software, allowing attackers to bypass critical safety controls and execute dangerous, unauthorized commands on affected systems.
Vulnerability Explanation
OpenClaw includes a security feature designed to only permit a specific, safe list of commands (an allowlist). However, in versions before 2026.2.2, the software does not properly check for Windows command shell (cmd.exe) special characters.
In simple terms, an attacker can inject characters like the ampersand (&) or variable syntax (%...%) into a command request. The system checks if the first part of the command is on the safe list and approves it, but these special characters then allow the attacker to “chain” or inject additional, malicious commands that run without approval. It’s like a security guard checking your ID at a gate and letting you in, but not noticing you’re followed by a group of unauthorized people.
Impact
The impact of this vulnerability is severe (CVSS Score: 9.8 - CRITICAL). A remote attacker who can reach the vulnerable OpenClaw interface could:
- Execute arbitrary commands on the host operating system.
- Steal, modify, or delete sensitive data.
- Install malware or other persistent backdoors.
- Move laterally to other systems on the network. This could lead to full system compromise, major data breaches, and operational disruption.
Remediation and Mitigation
Immediate action is required to protect your systems.
Primary Remediation:
- Upgrade: The definitive fix is to upgrade OpenClaw to version 2026.2.2 or later. This version properly sanitizes command input and validates against shell metacharacters.
Temporary Mitigations (if immediate upgrade is not possible):
- Network Restriction: Immediately restrict network access to the OpenClaw management interface. Allow connections only from absolutely necessary, trusted administrative IP addresses using firewall rules or network security groups.
- Review Logs: Audit OpenClaw application and system logs for any unusual or unexpected command execution activity, particularly entries containing shell metacharacters (
&,|,%,>,<). - Principle of Least Privilege: Ensure the operating system account running the OpenClaw service has the minimum permissions required to function, limiting the potential impact of a successful exploit.
All users and administrators of OpenClaw should prioritize applying the official patch to fully resolve this critical vulnerability.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-28391?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access....
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files from ...
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a remot...
Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (...
Other Windows Vulnerabilities
External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access....
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network....
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. `URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows th...
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files from ...