Impact
OpenClaw versions before 2026.2.22 contain an allowlist bypass in the safeBins configuration that lets an attacker invoke external helpers through the compress-program option. The vulnerability enables the execution of arbitrary external programs, effectively providing remote code execution capability. The weakness is categorized as CWE-78, indicating improper command/OS execution.
Affected Systems
Affected vendor: OpenClaw. Product: OpenClaw. All releases prior to 2026.2.22 are vulnerable. The specific configuration change that triggers the issue is the addition of the "sort" tool to tools.exec.safeBins.
Risk and Exploitability
The CVSS base score is 7.1, indicating a high severity. EPSS is not available, so the likelihood of automated exploitation is uncertain. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, as the description states that remote attackers can bypass the safe-bin approval constraints via the compress-program parameter. Exploitation requires the ability to modify or influence the configuration, which may be possible for attackers with system configuration access or via exposed APIs.
OpenCVE Enrichment
Github GHSA