Impact
The vulnerability is a command injection flaw in the system.run shell-wrapper of OpenClaw. Attackers can embed hidden commands by inserting positional argv carriers after an inline shell payload. This allows execution of arbitrary commands that bypass display context validation while hiding them within misleading approval text.
Affected Systems
All OpenClaw installations running a version earlier than 2026.2.24 are affected. The vulnerability exists in the Node.js-based OpenClaw system and impacts any deployment using the affected package from the OpenClaw repository.
Risk and Exploitability
The CVSS score of 5.8 indicates moderate severity, and the EPSS score of fewer than 1% suggests that widespread exploitation is unlikely. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is inferred to be remote, requiring an attacker to supply crafted input to the system.run shell-wrapper; however, no explicit broadcast of vector details is provided in the data.
OpenCVE Enrichment
Github GHSA