Impact
OpenClaw versions before 2026.2.14 suffer from a command hijacking flaw that allows an attacker to execute arbitrary binaries by manipulating the PATH environment variable. The flaw is rooted in CWE-427, where an untrusted PATH is processed, enabling a malicious binary to override an allowed command. If exploited, the attacker can run any shell command with the privileges of the affected user or service, compromising confidentiality, integrity, and availability of the system.
Affected Systems
The affected product is OpenClaw. Versions prior to 2026.2.14 are vulnerable. Users of OpenClaw who run the application in attacker‑controlled directories or who have authenticated access to node‑host execution interfaces are at risk, regardless of the operating system, as the issue is inherent to the JavaScript runtime environment.
Risk and Exploitability
The CVSS score is 7.7, indicating a high severity level. EPSS is less than 1 percent, implying the probability of successful exploitation is low at present. The vulnerability is not listed in KEV, suggesting that no widespread active exploitation has been reported. The likely attack vector involves an attacker who can control the PATH variable, such as through authenticated node‑host execution or by placing malicious executables in directories that OpenClaw searches. By inserting a malicious binary before the safe‑bin commands, the attacker can hijack command execution and run arbitrary code.
OpenCVE Enrichment
Github GHSA