Impact
OpenClaw versions prior to 2026.4.22 are vulnerable to a shell expansion bypass that allows injected commands to be executed when unquoted heredoc bodies are processed. This flaw enables users who can control the input to run arbitrary commands, compromising the confidentiality, integrity, or availability of the system. The weakness is a classic command injection scenario (CWE‑184).
Affected Systems
Affected components include the OpenClaw application released by OpenClaw. Any installation running a version older than 2026.4.22 is susceptible; versions 2026.4.22 and later contain the remediation.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.7, indicating high severity. EPSS is not available and the issue is not listed in the CISA KEV catalog. Attackers can exploit the flaw by submitting a crafted heredoc that contains shell expansions. The exploit path requires the ability to influence OpenClaw’s input; if the application runs with elevated privileges, the attacker can gain equivalent privileges. Given its high CVSS, the risk is significant, especially in environments where OpenClaw processes untrusted data or runs as a privileged service.
OpenCVE Enrichment