Description
OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.
Published: 2026-03-05
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Command Execution
Action: Patch Immediately
AI Analysis

Impact

OpenClaw versions before 2026.2.14 suffer from a command hijacking flaw that allows an attacker to execute arbitrary binaries by manipulating the PATH environment variable. The flaw is rooted in CWE-427, where an untrusted PATH is processed, enabling a malicious binary to override an allowed command. If exploited, the attacker can run any shell command with the privileges of the affected user or service, compromising confidentiality, integrity, and availability of the system.

Affected Systems

The affected product is OpenClaw. Versions prior to 2026.2.14 are vulnerable. Users of OpenClaw who run the application in attacker‑controlled directories or who have authenticated access to node‑host execution interfaces are at risk, regardless of the operating system, as the issue is inherent to the JavaScript runtime environment.

Risk and Exploitability

The CVSS score is 7.7, indicating a high severity level. EPSS is less than 1 percent, implying the probability of successful exploitation is low at present. The vulnerability is not listed in KEV, suggesting that no widespread active exploitation has been reported. The likely attack vector involves an attacker who can control the PATH variable, such as through authenticated node‑host execution or by placing malicious executables in directories that OpenClaw searches. By inserting a malicious binary before the safe‑bin commands, the attacker can hijack command execution and run arbitrary code.

Generated by OpenCVE AI on April 16, 2026 at 11:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.14 or later
  • If an upgrade cannot be applied immediately, modify the PATH environment to include only trusted directories or explicitly whitelist safe‑bin commands in startup scripts
  • Limit node‑host execution to authenticated users and audit local directories for unexpected executables to prevent PATH hijacking

Generated by OpenCVE AI on April 16, 2026 at 11:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jqpq-mgvm-f9r6 OpenClaw: Command hijacking via unsafe PATH handling (bootstrapping + node-host PATH overrides)
History

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.
Title OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-427
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T20:36:53.974Z

Reserved: 2026-03-04T16:16:15.967Z

Link: CVE-2026-29610

cve-icon Vulnrichment

Updated: 2026-03-09T20:36:50.677Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:24.253

Modified: 2026-03-11T01:02:58.387

Link: CVE-2026-29610

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses