CVE-2026-28363: In OpenClaw
CVE-2026-28363
Attackers bypass OpenClaw security controls to execute arbitrary commands via a single malformed argument. This critical flaw (CVSS 9.9) threatens full system compromise. Upgrade to version 2026.2.23 immediately.
Patch now - CVE-2026-28363 is a critical command injection flaw in OpenClaw prior to 2026.2.23 that grants attackers arbitrary command execution on affected systems by bypassing an allowlist control with a GNU abbreviation variation.
Overview
A critical security vulnerability has been identified in OpenClaw, a software management tool, affecting versions prior to 2026.2.23. This flaw allows attackers to bypass critical security controls, potentially leading to unauthorized command execution on affected systems.
Vulnerability Explanation
OpenClaw includes a security feature designed to restrict which system commands can be executed. This feature uses an “allowlist” to only permit specific, safe commands. One such restricted command is sort, which has a dangerous option (--compress-program) that can be used to run other programs.
The vulnerability exists because the validation check was too strict. It only blocked the exact string --compress-program. An attacker can bypass this by using a shortened, but functionally identical, GNU-style abbreviation like --compress-prog. The system’s sort command treats both forms the same way, but OpenClaw’s security check did not, allowing the malicious command to proceed without the required approval.
Potential Impact
This is a critical-severity vulnerability (CVSS: 9.9). By exploiting this bypass, an attacker with basic access to a system running a vulnerable version of OpenClaw could execute arbitrary commands with the same privileges as the OpenClaw process. This could lead to:
- Full system compromise
- Data theft or destruction
- Installation of malware or backdoors
- Use of the system as a foothold for attacking other network resources
Remediation and Mitigation
Immediate Action Required:
- Upgrade: The primary fix is to update OpenClaw to version 2026.2.23 or later. This update corrects the validation logic to properly catch all dangerous option variants.
- Patch Management: If an immediate upgrade is not possible, apply any official vendor patches specifically addressing CVE-2026-28363.
- Temporary Mitigation: As a temporary workaround, consider disabling the affected
tools.execfunctionality or implementing strict network-level access controls to systems running vulnerable versions of OpenClaw until they can be patched. - Audit: Review systems for any unauthorized activity or unexpected processes that may indicate prior exploitation of this vulnerability.
All users and administrators of OpenClaw should prioritize applying the update to prevent potential system compromise.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-28363?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.netw...
OpenClaw before 2026.4.10 contains an improper network binding vulnerability in the sandbox browser CDP relay that exposes Chrome DevTools Protocol on 0.0.0.0. Attackers can access the DevTools protoc...
OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrai...
OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers ca...
Other Openclaw Openclaw Vulnerabilities
OpenClaw before 2026.4.10 contains an improper network binding vulnerability in the sandbox browser CDP relay that exposes Chrome DevTools Protocol on 0.0.0.0. Attackers can access the DevTools protoc...
OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute...
OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability in the fal provider image-generation-provider.ts component that allows attackers to fetch internal URLs. A malicious or c...
OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrai...