DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

GHSA-VMQR-RC7X-3446: CVE-2026-28363: Remote Code Execution in OpenClaw via safeBins Validation Bypass

CVE-2026-28363: Remote Code Execution in OpenClaw via safeBins Validation Bypass

Vulnerability ID: GHSA-VMQR-RC7X-3446
CVSS Score: 9.9
Published: 2026-03-03

A critical security bypass in OpenClaw's safeBins mechanism allows authenticated users to execute arbitrary commands. The vulnerability exploits a discrepancy between OpenClaw's strict string matching validator and the GNU getopt_long argument parser used by underlying system binaries. By using unique abbreviations of restricted flags (e.g., --compress-prog instead of --compress-program), attackers can evade security controls.

TL;DR

OpenClaw < 2026.2.23 fails to block abbreviated command-line flags. Attackers can use shortened versions of dangerous flags (like --compress-p for sort) to bypass the allowlist and achieve Remote Code Execution.


⚠️ Exploit Status: WEAPONIZED

Technical Details

  • CWE ID: CWE-184
  • Attack Vector: Network (AV:N)
  • CVSS Score: 9.9 (Critical)
  • EPSS Score: 0.00089
  • Impact: Remote Code Execution
  • Exploit Status: Weaponized

Affected Systems

  • OpenClaw
  • OpenClaw: < 2026.2.23 (Fixed in: 2026.2.23)

Code Analysis

Commit: 3b8e330

Fix safeBins bypass via flag canonicalization

Exploit Details

  • CXSecurity: Public exploit leveraging sort abbreviation bypass

Mitigation Strategies

  • Canonicalize inputs before validation
  • Implement strict allowlisting for arguments (not just binaries)
  • Run the application with least-privilege user accounts

Remediation Steps:

  1. Upgrade OpenClaw to version 2026.2.23 immediately.
  2. Verify safeBins configuration to ensure no unnecessary binaries are exposed.
  3. Restart the OpenClaw service to apply changes.

References


Read the full report for GHSA-VMQR-RC7X-3446 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)