CVE-2026-28363: Remote Code Execution in OpenClaw via safeBins Validation Bypass
Vulnerability ID: GHSA-VMQR-RC7X-3446
CVSS Score: 9.9
Published: 2026-03-03
A critical security bypass in OpenClaw's safeBins mechanism allows authenticated users to execute arbitrary commands. The vulnerability exploits a discrepancy between OpenClaw's strict string matching validator and the GNU getopt_long argument parser used by underlying system binaries. By using unique abbreviations of restricted flags (e.g., --compress-prog instead of --compress-program), attackers can evade security controls.
TL;DR
OpenClaw < 2026.2.23 fails to block abbreviated command-line flags. Attackers can use shortened versions of dangerous flags (like --compress-p for sort) to bypass the allowlist and achieve Remote Code Execution.
⚠️ Exploit Status: WEAPONIZED
Technical Details
- CWE ID: CWE-184
- Attack Vector: Network (AV:N)
- CVSS Score: 9.9 (Critical)
- EPSS Score: 0.00089
- Impact: Remote Code Execution
- Exploit Status: Weaponized
Affected Systems
- OpenClaw
-
OpenClaw: < 2026.2.23 (Fixed in:
2026.2.23)
Code Analysis
Commit: 3b8e330
Fix safeBins bypass via flag canonicalization
Exploit Details
- CXSecurity: Public exploit leveraging sort abbreviation bypass
Mitigation Strategies
- Canonicalize inputs before validation
- Implement strict allowlisting for arguments (not just binaries)
- Run the application with least-privilege user accounts
Remediation Steps:
- Upgrade OpenClaw to version 2026.2.23 immediately.
- Verify
safeBinsconfiguration to ensure no unnecessary binaries are exposed. - Restart the OpenClaw service to apply changes.
References
Read the full report for GHSA-VMQR-RC7X-3446 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)