Impact
OpenClaw’s exec safeBins policy allows attackers to write arbitrary files using short‑option payloads. By attaching short options such as –o to binaries that are marked safe, an attacker can bypass argument validation and create or overwrite files within the application environment. This leads to unauthorized file‑write capabilities that may facilitate further compromise. The underlying weakness is identified as CWE‑184.
Affected Systems
Affected products: OpenClaw:OpenClaw. All OpenClaw releases prior to 2026.2.19 contain the vulnerability; the advisory indicates that version 2026.2.19 and later provide a fix.
Risk and Exploitability
The CVSS score is 6, indicating medium severity, and the EPSS score is not available. KEV does not list this vulnerability. The attack vector appears to involve supplying a crafted command that invokes a whitelisted binary with short‑option arguments; no explicit prerequisites or elevated privileges are mentioned in the description. Consequently, the risk is considered medium, but the ability to write files in sensitive locations could raise the impact if exploited.
OpenCVE Enrichment
Github GHSA