CVE-2026-34425: Validation Bypass in OpenClaw Shell-Bleed Protection
Vulnerability ID: CVE-2026-34425
CVSS Score: 5.4
Published: 2026-04-06
OpenClaw versions prior to commit 8aceaf5d0f0ec552b75a792f7f0a3bfa5b091513 contain a validation bypass vulnerability in the preflight script execution checker. The fail-open design of the command parser allows malicious shell syntax to evade detection and execute arbitrary code. The patch implements a robust, fail-closed command tokenizer.
TL;DR
A fail-open logic flaw in OpenClaw's preflight script validator allows attackers to bypass 'Shell-Bleed' protections using complex shell syntax, enabling execution of unvalidated script content.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-184
- Attack Vector: Network
- CVSS v3.1: 5.4
- CVSS v4.0: 5.3
- EPSS Score: 0.00048
- KEV Listed: False
- Patch Status: Patched
Affected Systems
- OpenClaw (npm) preflight validation mechanism
- OpenClaw Shell-Bleed protection modules
-
OpenClaw: Prior to commit 8aceaf5d0f0ec552b75a792f7f0a3bfa5b091513 (Fixed in:
Commit 8aceaf5)
Code Analysis
Commit: 8aceaf5
Fix Shell-Bleed bypass via tokenizer rewrite
Mitigation Strategies
- Upgrade OpenClaw components to the latest patched release
- Implement application-edge filtering for complex shell syntax and shell wrappers
- Isolate execution agents in restricted sandbox environments
- Limit environment variable exposure within the execution context
Remediation Steps:
- Identify all deployments utilizing vulnerable versions of OpenClaw.
- Apply the patch from commit 8aceaf5d0f0ec552b75a792f7f0a3bfa5b091513 by updating the package via npm.
- Validate that the new fail-closed tokenizer does not break legitimate execution workloads relying on complex shell syntax.
- Monitor execution logs for rejected complex shell commands indicative of bypass attempts.
References
- NVD Record CVE-2026-34425
- GHSA-fvx6-pj3r-5q4q Advisory
- Fix Commit 8aceaf5d0f0ec552b75a792f7f0a3bfa5b091513
- VulnCheck Advisory
Read the full report for CVE-2026-34425 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)