Impact
OpenClaw versions prior to 2026.2.19 contain a local command injection flaw due to unsafe handling of cmd metacharacters and CR/LF sequences in gateway.cmd file generation for Windows scheduled tasks; this is an instance of OS Command Injection (CWE-78) that allows a local attacker with control over service script generation arguments to inject and execute arbitrary commands within the scheduled task context, potentially compromising confidentiality, integrity, or availability of the affected system.
Affected Systems
The vulnerability affects OpenClaw software deployments running on Windows operating systems, specifically versions earlier than 2026.2.19. Users must verify that their OpenClaw instance is not on the affected version list and that no untrusted parties have access to configure or supply script generation arguments.
Risk and Exploitability
With a CVSS score of 6.9 the vulnerability is of moderate severity. An EPSS score of less than 1% indicates a low probability of exploitation in the field. The vulnerability is not found in the CISA KEV catalog, suggesting limited exploitation data. Exploitation requires local access to the script generation mechanism; remote exploitation is not supported. If an attacker can control the input arguments, they can execute arbitrary commands in the scheduled task context, leading to potential system compromise.
OpenCVE Enrichment
Github GHSA