GHSA-8MF7-VV8W-HJR2: Remote Code Execution via Insecure SafeBins Fallback in OpenClaw
Vulnerability ID: GHSA-8MF7-VV8W-HJR2
CVSS Score: 9.8
Published: 2026-03-03
A critical Remote Code Execution (RCE) vulnerability exists in OpenClaw's safeBins execution allowlist mechanism. The flaw resides in the tools.exec.safeBins configuration logic, where a permissive generic fallback profile was applied to binaries lacking specific security definitions. This oversight allows attackers to bypass command approval policies by leveraging interpreter binaries (e.g., Python, Node.js) to execute arbitrary inline payloads, effectively neutralizing the intended security controls of the agent framework.
TL;DR
OpenClaw versions prior to 2026.2.23 contain a critical flaw in the safeBins allowlist logic. If a binary is added to the allowlist without a specific security profile, the system defaults to a permissive generic profile that fails to block dangerous command-line flags. This allows attackers to achieve Remote Code Execution (RCE) by invoking interpreters with inline code execution arguments (e.g., python3 -c ...). The vulnerability is patched in version 2026.2.23 by removing the generic fallback and enforcing a deny-by-default policy.
⚠️ Exploit Status: POC
Technical Details
- CWE: CWE-184 (Incomplete List of Disallowed Inputs)
- CVSS v3.1: 9.8 (Critical)
- Attack Vector: Network (Remote)
- Privileges Required: None
- User Interaction: None
- Impact: Remote Code Execution (RCE)
Affected Systems
- OpenClaw
-
OpenClaw: < 2026.2.23 (Fixed in:
2026.2.23)
Code Analysis
Commit: 47c3f74
Remove generic safe bin profile and enforce deny-by-default
- const profile = safeBinProfiles[execName] ?? genericSafeBinProfile;
+ const profile = safeBinProfiles[execName];
+ if (!profile) return false;
Mitigation Strategies
- Upgrade to OpenClaw v2026.2.23+
- Remove generic interpreters from allowlists
- Enforce explicit security profiles for all allowed binaries
- Implement strict argument filtering
Remediation Steps:
- Check the current OpenClaw version; if < 2026.2.23, schedule an immediate update.
- Review the
config.yamlor environment configuration fortools.exec.safeBins. - Identify any binary in
safeBinsthat does not have a matching key intools.exec.safeBinProfiles. - Remove unprofiled binaries or add specific profiles defining allowed arguments.
- Restart the OpenClaw service to apply configuration changes.
References
Read the full report for GHSA-8MF7-VV8W-HJR2 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)