Impact
OpenClaw, in versions before 2026.3.1, contains a current working directory injection flaw within its Windows wrapper resolution for .cmd and .bat files. An attacker can manipulate the current working directory during wrapper resolution and, because the application falls back to the wrong execution mechanism, can influence the commands that are ultimately run. The result is a loss of command execution integrity that permits an attacker to run arbitrary code. The vulnerability is classified as CWE‑78, improper use of system commands.
Affected Systems
The affected product is OpenClaw (OpenClaw:OpenClaw) running on Windows platforms. Specifically, all Windows releases of OpenClaw earlier than version 2026.3.1, including the 2026.2.26 release, are vulnerable. No other OS or product variants are listed as affected.
Risk and Exploitability
The CVSS base score for this issue is 5.8, indicating a medium severity vulnerability. The EPSS score is not provided and the vulnerability is not listed in the CISA KEV catalog. The description states that remote attackers can exploit the flaw by sending crafted inputs that influence cwd, implying that the attacker does not need local access. Therefore, the risk is moderate overall, but the impact of successful exploitation—potential arbitrary command execution—requires timely remediation.
OpenCVE Enrichment
Github GHSA