Impact
OpenClaw versions before 2026.2.21 contain a vulnerability in the grep command used by tools.exec.safeBins. By providing a pattern via the -e flag, an attacker can bypass the tool’s stdin‑only policy and supply a positional filename operand, enabling read access to any file in the working directory, such as .env that often holds credentials. The flaw is a CWE‑184 (Arbitrary File Read) that can compromise confidentiality of sensitive information.
Affected Systems
Affected systems include the OpenClaw product, all releases before 2026.2.21. The vulnerability is present in the grep binary packaged within the tools.exec.safeBins module. No other vendors or products are listed in the CNA data.
Risk and Exploitability
The CVSS score is 6.0, indicating a moderate severity. EPSS data is unavailable and the vulnerability is not listed in CISA’s KEV catalog, suggesting limited known exploitation. The attack vector is inferred to be local or application‑level, as the exploit requires the ability to invoke the grep tool with arbitrary flags. If an attacker can leverage the affected functionality, they can read any readable file, potentially leading to credential theft or other security breaches.
OpenCVE Enrichment
Github GHSA