Impact
OpenClaw versions prior to 2026.2.23 contain an arbitrary binary execution vulnerability in the shell-env component. The flaw stems from the trusted‑prefix fallback logic used when interpreting the $SHELL environment variable. An attacker who can influence $SHELL and write to a directory that OpenClaw treats as a trusted prefix (e.g., /opt/homebrew/bin) can place an attacker‑controlled binary there and cause OpenClaw to execute it. The impact is the ability to run arbitrary code with the privileges of the OpenClaw process.
Affected Systems
The affected product is OpenClaw (vendor OpenClaw). Vulnerable releases include 2026.2.22 and any earlier release before 2026.2.23. The specific affected component is shell‑env and the vulnerability is present only when $SHELL is overridden and the trusted‑prefix directory is writable.
Risk and Exploitability
The CVSS v3.1 score is 5.8, indicating moderate severity. No EPSS score is available, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers would need the ability to set the $SHELL environment variable and write to a trusted‑prefix directory, which is typically achievable by a local user with write access to that directory. Given these prerequisites, exploitation is possible in a local or compromised‑environment scenario, but would not be feasible over a standard network unless the attacker can place files on such a directory remotely.
OpenCVE Enrichment
Github GHSA