Impact
The vulnerability is an environment variable injection in the system.run function of OpenClaw. It allows attackers to bypass the command allowlist restrictions by manipulating the SHELLOPTS and PS4 environment variables, enabling arbitrary shell command execution via bash xtrace expansion. This is a classic OS command injection (CWE-78) and results in remote code execution outside the intended command body.
Affected Systems
OpenClaw (OpenClaw) is affected. All versions prior to 2026.2.22 contain the flaw. The affected product runs on Node.js, as indicated by its CPE string cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity, while the EPSS score is not provided and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the ability to invoke system.run with request-scope environment variables. The likely attack vector, based on the description, is through an exposed application interface that allows control of environment variables. Attackers can inject commands that are executed outside the allowlisted command body through bash xtrace, giving them full remote code execution capability.
OpenCVE Enrichment
Github GHSA