Impact
OpenClaw versions prior to 2026.2.2 fail to validate Windows cmd.exe metacharacters in allowlist‑controlled execution requests. Attackers can embed shell metacharacters such as & or %…% into the command string, bypassing the allowlist check and executing arbitrary commands. This is a command injection flaw (CWE-78) that enables remote code execution with the privileges of the OpenClaw service, potentially leading to full compromise of the host system.
Affected Systems
The vulnerability affects the OpenClaw product from vendor OpenClaw. All releases older than version 2026.2.2 are impacted, including those distributed as Node.js applications identified by the CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*.
Risk and Exploitability
The flaw scores 9.2 on the CVSS scale, indicating a critical threat. The EPSS score is below 1%, suggesting a low current probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Attackers can target the service remotely, especially when the allowlist gating is enabled and command execution is permitted. Successful exploitation grants arbitrary code execution on the host machine.
OpenCVE Enrichment
Github GHSA