Impact
OpenClaw versions prior to 2026.2.23 contain a flaw in the tools.exec.safeBins component where the validation of the GNU sort command fails to enforce deny‑flag checks for long‑option abbreviations. Attackers can supply abbreviated long options to the sort command, allowing them to bypass the allowlist enforcement and execute sort commands that would otherwise be denied. The weakness is a command‑validation issue classified as CWE‑863.
Affected Systems
The affected product is OpenClaw (openclaw:openclaw) running any version with the release identifier 2026.2.22‑2 or earlier, up to but not including 2026.2.23. The CPE entries include the core OpenClaw component and a node.js component; the vulnerability is specific to the OpenClaw application itself.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, and the EPSS score of less than 1 % suggests that exploitation is currently uncommon. The vulnerability is not listed in the CISA KEV catalog. The CVE description states that remote attackers can execute sort commands with abbreviated long options, so it is inferred that the attack vector is remote via a network‑accessible interface that accepts sort commands. No other prerequisites or specific conditions are described beyond the presence of the allowlist mechanism.
OpenCVE Enrichment
Github GHSA