Impact
OpenClaw implements shell‑bleed protection that blocks execution of risky script fragments. A flaw in the preflight validation logic allows attackers to craft piped, substituted, or subshell commands that evade the validateScriptFileForShellBleed check, enabling the execution of script content that would normally be prevented. This results in arbitrary code execution within the application’s scripting engine, potentially compromising availability, confidentiality, and integrity.
Affected Systems
All installations of OpenClaw running a version before the commit identified by 8aceaf5d0f0ec552b75a792f7f0a3bfa5b091513 are vulnerable. The vulnerability affects the default Node.js implementation bundled with OpenClaw; any environment exposing the script analysis functionality is at risk. Upgrading to the mentioned commit or later releases resolves the issue.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, but the lack of an EPSS score and exclusion from KEV suggest limited evidence of active exploitation yet. The flaw can be leveraged by an attacker who can supply crafted command strings to the application, thus the likely attack vector is through application‑side script input. If the application processes user‑supplied command fragments, an attacker could trigger the bypass and execute arbitrary code.
OpenCVE Enrichment