Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.7
OpenClaw tools.exec module allows attackers to bypass denied commands
GHSA-3c6h-g97w-fg78
Summary
An issue in OpenClaw's tools.exec module allows attackers to bypass certain security restrictions on the sort command. This could potentially allow unauthorized execution of commands. Affected users should update to the latest version of OpenClaw to fix the issue.
What to do
- Update openclaw to version 2026.2.23.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | openclaw | <= 2026.2.23 | 2026.2.23 |
Original title
OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag ch...
Original description
OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode.
ghsa CVSS3.1
8.8
Vulnerability type
CWE-184
CWE-863
Incorrect Authorization
- https://github.com/openclaw/openclaw/security/advisories/GHSA-3c6h-g97w-fg78
- https://github.com/openclaw/openclaw/commit/3b8e33037ae2e12af7beb56fcf0346f1f8cb...
- https://github.com/advisories/GHSA-3c6h-g97w-fg78
- https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-sort-long-opt...
- https://nvd.nist.gov/vuln/detail/CVE-2026-32059
Published: 3 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026