CVE-2026-28363: Remote Code Execution in OpenClaw via Argument Injection
Vulnerability ID: GHSA-4GC7-QCVF-38WG
CVSS Score: 9.9
Published: 2026-03-03
A critical remote code execution vulnerability exists in the OpenClaw automation platform (versions prior to 2026.2.23). The flaw resides in the 'safe-bin' allowlist validation logic, which fails to account for GNU long-option abbreviations when sanitizing command-line arguments. Low-privileged authenticated users can exploit this by supplying abbreviated flags (e.g., '--compress-p' instead of '--compress-program') to the 'sort' utility. This bypasses the security filter while still being interpreted by the underlying binary as a dangerous directive, allowing the execution of arbitrary system commands.
TL;DR
OpenClaw failed to block abbreviated GNU command-line flags. Attackers can bypass the allowlist for the 'sort' command using shortened flags like '--compress-p', leading to authenticated Remote Code Execution (RCE). Fixed in version 2026.2.23.
⚠️ Exploit Status: WEAPONIZED
Technical Details
- CVE ID: CVE-2026-28363
- CVSS v3.1: 9.9 (Critical)
- CWE: CWE-184 (Incomplete List of Disallowed Inputs)
- Attack Vector: Network (Authenticated)
- Affected Component: safe-bin validation (sort utility)
- Exploit Status: PoC Available
Affected Systems
- OpenClaw Automation Platform
-
OpenClaw: < 2026.2.23 (Fixed in:
2026.2.23)
Code Analysis
Commit: 3b8e330
fix(security): implement GNU flag canonicalization for safe-bin validation
@@ -45,7 +45,15 @@
- if (deniedFlags.has(flag)) {
+ const canonical = resolveCanonicalLongFlag(flag, knownFlags);
+ if (canonical && deniedFlags.has(canonical)) {
Exploit Details
- CXSecurity: Full Python PoC demonstrating reverse shell injection via sort compression flag.
Mitigation Strategies
- Update OpenClaw to version 2026.2.23 or later.
- Restrict access to the
tools.execAPI endpoint to trusted administrators only. - Audit
tools.exec.safeBinsconfiguration to removesortif not strictly required. - Run the OpenClaw service with a non-privileged user account to limit blast radius.
Remediation Steps:
- Pull the latest container image or source code for OpenClaw (tag
v2026.2.23). - Redeploy the application service.
- Verify the fix by attempting to run
sort --compress-prog=echovia the API; it should be rejected. - Rotate any API tokens or credentials that were active prior to the patch.
References
Read the full report for GHSA-4GC7-QCVF-38WG on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)