Impact
OpenClaw versions earlier than 2026.2.23 contain a flaw that permits authenticated operators to bypass the system.run guardrails by using the command /usr/bin/env with the -S option. The vulnerability, identified as CWE-184, allows unintended commands to be executed with the privileges of the operator, enabling the launch of arbitrary shell wrapper payloads at runtime and potentially compromising the host system.
Affected Systems
The affected infrastructure is comprised of all deployments of OpenClaw:OpenClaw where the system.run allowlist includes /usr/bin/env and the software version is less than 2026.2.23. Only the OpenClaw product is listed as affected.
Risk and Exploitability
The issue has a CVSS score of 7.1, indicating high severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated operator access and the ability to supply a system.run command. The bypass uses a benign system utility (/usr/bin/env) with the -S flag, enabling an attacker to execute malicious shell scripts once the guardrails are circumvented.
OpenCVE Enrichment
Github GHSA