Description
In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.
Published: 2026-02-27
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Command Execution via Untyped SafeBins Validation Bypass
Action: Immediate Patch
AI Analysis

Impact

OpenClaw’s sort command validates executables using a safeBins allowlist. Prior to version 2026.2.23, a bypass was possible by supplying GNU long-option abbreviations that matched allowed patterns, such as --compress-prog, while the exact string --compress-program was correctly denied. This flaw allowed users to trigger execution paths that should have required explicit approval, effectively enabling arbitrary command execution through the sort interface. The core weakness is a CWE-184 type flaw where option values are not fully validated, leading to command injection vulnerabilities.

Affected Systems

All instances of OpenClaw before the 2026.2.23 release are affected. This includes any deployment that uses the OpenClaw sort tool without updated version enforcement. No specific operating system or platform filtering is mentioned; the issue exists wherever the unsafe safeBins validation is active.

Risk and Exploitability

The CVSS score of 9.9 indicates critical severity, and the EPSS score of < 1% suggests low current exploitation probability, likely due to the need for user interaction or privileged access to provide the offending option. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local or within the scope of users who can invoke the OpenClaw sort command with arbitrary arguments. An attacker would need to supply a long-option abbreviation that matches the safeBins allowlist but bypasses the exact match required for approval. If successful, unrestricted options would be executed, potentially compromising system confidentiality, integrity, and availability.

Generated by OpenCVE AI on April 18, 2026 at 10:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenClaw 2026.2.23 or later to obtain the validated safeBins logic.
  • Reconfigure the OpenClaw sort command to enforce strict option names, ensuring that only fully-qualified option strings such as --compress-program are accepted and that abbreviations are rejected.
  • Audit and, if possible, disable the allowlist mode for sort or implement additional checks that prevent unapproved options from being executed.

Generated by OpenCVE AI on April 18, 2026 at 10:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7977-c43c-xpwj OpenClaw is vulnerable to validation bypass through GNU long-option abbreviations in allowlist mode
History

Sat, 18 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Title Unsafe SafeBins Validation in OpenClaw Sort Enables Execution of Unapproved Commands

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw openclaw
Vendors & Products Openclaw
Openclaw openclaw

Fri, 27 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.
Weaknesses CWE-184
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-27T15:47:06.970Z

Reserved: 2026-02-27T03:17:37.164Z

Link: CVE-2026-28363

cve-icon Vulnrichment

Updated: 2026-02-27T15:47:03.257Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T04:16:03.227

Modified: 2026-02-27T19:13:57.257

Link: CVE-2026-28363

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:30:35Z

Weaknesses