Critical (9.9)

CVE-2026-28363: In OpenClaw

CVE-2026-28363

Attackers bypass OpenClaw security controls to execute arbitrary commands via a single malformed argument. This critical flaw (CVSS 9.9) threatens full system compromise. Upgrade to version 2026.2.23 immediately.

Affected: Openclaw Openclaw

Patch now - CVE-2026-28363 is a critical command injection flaw in OpenClaw prior to 2026.2.23 that grants attackers arbitrary command execution on affected systems by bypassing an allowlist control with a GNU abbreviation variation.

Overview

A critical security vulnerability has been identified in OpenClaw, a software management tool, affecting versions prior to 2026.2.23. This flaw allows attackers to bypass critical security controls, potentially leading to unauthorized command execution on affected systems.

Vulnerability Explanation

OpenClaw includes a security feature designed to restrict which system commands can be executed. This feature uses an “allowlist” to only permit specific, safe commands. One such restricted command is sort, which has a dangerous option (--compress-program) that can be used to run other programs.

The vulnerability exists because the validation check was too strict. It only blocked the exact string --compress-program. An attacker can bypass this by using a shortened, but functionally identical, GNU-style abbreviation like --compress-prog. The system’s sort command treats both forms the same way, but OpenClaw’s security check did not, allowing the malicious command to proceed without the required approval.

Potential Impact

This is a critical-severity vulnerability (CVSS: 9.9). By exploiting this bypass, an attacker with basic access to a system running a vulnerable version of OpenClaw could execute arbitrary commands with the same privileges as the OpenClaw process. This could lead to:

  • Full system compromise
  • Data theft or destruction
  • Installation of malware or backdoors
  • Use of the system as a foothold for attacking other network resources

Remediation and Mitigation

Immediate Action Required:

  1. Upgrade: The primary fix is to update OpenClaw to version 2026.2.23 or later. This update corrects the validation logic to properly catch all dangerous option variants.
  2. Patch Management: If an immediate upgrade is not possible, apply any official vendor patches specifically addressing CVE-2026-28363.
  3. Temporary Mitigation: As a temporary workaround, consider disabling the affected tools.exec functionality or implementing strict network-level access controls to systems running vulnerable versions of OpenClaw until they can be patched.
  4. Audit: Review systems for any unauthorized activity or unexpected processes that may indicate prior exploitation of this vulnerability.

All users and administrators of OpenClaw should prioritize applying the update to prevent potential system compromise.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-28363?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Other Openclaw Openclaw Vulnerabilities

View all Openclaw Openclaw vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.