Description
OpenClaw versions 2026.2.26 prior to 2026.3.1 on Windows contain a current working directory injection vulnerability in wrapper resolution for .cmd/.bat files that allows attackers to influence execution behavior through cwd manipulation. Remote attackers can exploit improper shell execution fallback mechanisms to achieve command execution integrity loss by controlling the current working directory during wrapper resolution.
Published: 2026-03-19
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Command Execution
Action: Patch
AI Analysis

Impact

OpenClaw, in versions before 2026.3.1, contains a current working directory injection flaw within its Windows wrapper resolution for .cmd and .bat files. An attacker can manipulate the current working directory during wrapper resolution and, because the application falls back to the wrong execution mechanism, can influence the commands that are ultimately run. The result is a loss of command execution integrity that permits an attacker to run arbitrary code. The vulnerability is classified as CWE‑78, improper use of system commands.

Affected Systems

The affected product is OpenClaw (OpenClaw:OpenClaw) running on Windows platforms. Specifically, all Windows releases of OpenClaw earlier than version 2026.3.1, including the 2026.2.26 release, are vulnerable. No other OS or product variants are listed as affected.

Risk and Exploitability

The CVSS base score for this issue is 5.8, indicating a medium severity vulnerability. The EPSS score is not provided and the vulnerability is not listed in the CISA KEV catalog. The description states that remote attackers can exploit the flaw by sending crafted inputs that influence cwd, implying that the attacker does not need local access. Therefore, the risk is moderate overall, but the impact of successful exploitation—potential arbitrary command execution—requires timely remediation.

Generated by OpenCVE AI on March 19, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OpenClaw release (2026.3.1 or later).
  • If you cannot upgrade immediately, avoid accepting untrusted input that triggers wrapper resolution and restrict the current working directory by setting environment variables or filesystem permissions.

Generated by OpenCVE AI on March 19, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6f6j-wx9w-ff4j CpenClaw's ACPX Windows wrapper shell fallback allowed cwd injection in specific paths
History

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 01:30:00 +0000

Type Values Removed Values Added
Description OpenClaw versions 2026.2.26 prior to 2026.3.1 on Windows contain a current working directory injection vulnerability in wrapper resolution for .cmd/.bat files that allows attackers to influence execution behavior through cwd manipulation. Remote attackers can exploit improper shell execution fallback mechanisms to achieve command execution integrity loss by controlling the current working directory during wrapper resolution.
Title OpenClaw 2026.2.26 < 2026.3.1 - Current Working Directory Injection via Windows Wrapper Resolution Fallback
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-78
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}

cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T16:56:19.904Z

Reserved: 2026-03-10T19:48:13.663Z

Link: CVE-2026-31999

cve-icon Vulnrichment

Updated: 2026-03-23T16:45:09.592Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T02:16:05.580

Modified: 2026-03-19T18:47:48.533

Link: CVE-2026-31999

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:55:32Z

Weaknesses