Description
OpenClaw versions prior to 2026.2.22 contain an arbitrary shell execution vulnerability in shell environment fallback that trusts the unvalidated SHELL path from the host environment. An attacker with local environment access can inject a malicious SHELL variable to execute arbitrary commands with the privileges of the OpenClaw process.
Published: 2026-03-19
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Shell Execution
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.2.22 are vulnerable to arbitrary shell execution due to a flaw in the shell environment fallback that trusts the unvalidated SHELL environment variable. When the OpenClaw process starts, it inherits the host environment and uses the SHELL value directly to locate a shell binary. An attacker controlling the local environment can set SHELL to a malicious script, allowing the execution of arbitrary commands with the privileges of the OpenClaw process. This represents a local privilege escalation or code execution risk (CWE-426).

Affected Systems

All OpenClaw deployments running a version older than 2026.2.22 are affected. The vulnerability is present in the OpenClaw product, as identified by the OpenClaw CNA, and applies to any installation that executes the vulnerable code path before the hardening introduced in 2026.2.22.

Risk and Exploitability

The CVSS score for this vulnerability is 7.3, indicating a high severity. EPSS data is not available, and the vulnerability is not yet listed in the CISA KEV catalog. Exploitation requires an attacker to have local access to set or influence the SHELL environment variable for the process. Once that precondition is met, the attacker can trigger arbitrary command execution with the OpenClaw process’s privileges, potentially allowing them to read, modify, or delete data, or pivot to further attacks within the same host. Therefore, the risk is significant for systems with local attacker presence and should be mitigated promptly.

Generated by OpenCVE AI on March 19, 2026 at 23:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.2.22 or later.
  • If the update cannot be applied immediately, restrict or unset the SHELL environment variable for the OpenClaw process to prevent arbitrary shell invocation.
  • Verify that the process is not running with elevated privileges that could be abused.
  • Monitor logs for unusual SHELL variable usage.

Generated by OpenCVE AI on March 19, 2026 at 23:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-f8mp-vj46-cq8v OpenClaw's shell env fallback trusts unvalidated SHELL path from host environment
History

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.22 contain an arbitrary shell execution vulnerability in shell environment fallback that trusts the unvalidated SHELL path from the host environment. An attacker with local environment access can inject a malicious SHELL variable to execute arbitrary commands with the privileges of the OpenClaw process.
Title OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variable
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-426
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-25T14:29:40.754Z

Reserved: 2026-03-10T19:48:43.187Z

Link: CVE-2026-32032

cve-icon Vulnrichment

Updated: 2026-03-20T20:06:40.966Z

cve-icon NVD

Status : Modified

Published: 2026-03-19T22:16:38.750

Modified: 2026-03-25T15:16:46.220

Link: CVE-2026-32032

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:44:21Z

Weaknesses