Impact
OpenClaw versions prior to 2026.3.31 allow attackers to bypass the exec allowlist by supplying shell options such as --rcfile, --init-file, and --startup-file. These options can point to attacker‑controlled initialization files, causing the shell to load and execute arbitrary code without being subject to the allowlist restrictions. This flaw effectively removes the boundary that was intended to restrict which commands could run, potentially leading to full command‑line compromise if an attacker can invoke the shell with malicious options.
Affected Systems
The vulnerability affects OpenClaw installations running a version earlier than 2026.3.31. No specific build numbers are listed beyond the date, so all releases before that cutoff are considered vulnerable. The affected product is the OpenClaw application stack, including its bundled environment that processes user‑supplied shell options.
Risk and Exploitability
The CVSS score of 5.4 indicates a moderate impact. EPSS data is not available, and the flaw is not listed in the CISA KEV catalog, suggesting a lower likelihood of widespread exploitation at this time. Nevertheless, the ability to execute arbitrary commands through the exec allowlist bypass is a serious issue if an attacker can supply the malicious shell options, potentially enabling remote code execution in scenarios where the shell is launched with user input.
OpenCVE Enrichment