Impact
OpenClaw versions 2026.1.21 through 2026.2.18 contain a path hijacking flaw in the tools.exec.safeBins module that bypasses allowlist validation by manipulating the process PATH. Attackers who can influence the gateway process PATH or its launch environment can execute malicious binaries that share an allowlisted name, such as jq, thereby executing arbitrary code in the context of the gateway process. This flaw represents a Remote Code Execution risk tied to CWE-426, compromising confidentiality, integrity, and availability of affected systems.
Affected Systems
The affected vendor is OpenClaw. All versions of OpenClaw prior to 2026.2.19, specifically 2026.1.21 and earlier versions up to but not including 2026.2.19, are vulnerable. No specific patch or fixed version number is provided in the CNA data, but the advisory indicates the issue is resolved in 2026.2.19.
Risk and Exploitability
The CVSS score of 7.3 indicates a High severity vulnerability. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread exploitation yet. Exploitation requires the attacker to affect the PATH environment of the gateway process, which usually implies local access or the ability to influence process launch parameters. If an attacker can set PATH to a directory under their control, they can launch trojan binaries with allowlisted names, defeating the validation controls. The vulnerability therefore poses a significant risk to environments where PATH is not tightly restricted.
OpenCVE Enrichment
Github GHSA