Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.5

OpenClaw on macOS Can Execute Unlisted Commands

GHSA-9p38-94jf-hgjj CVE-2026-22179
Summary

OpenClaw on macOS can execute unintended commands on the node host if you're using the allowlist mode. This can happen if you have a benign executable in your allowlist, but it's used in a way that allows malicious code to run. To protect your system, you should update to the latest version of OpenClaw, or change your security setting to deny instead of allowlist.

What to do
  • Update steipete openclaw to version 2026.2.22.
Affected software
VendorProductAffected versionsFix available
steipete openclaw <= 2026.2.22 2026.2.22
Original title
OpenClaw versions prior to 2026.2.22 in macOS node-host system.run contain an allowlist bypass vulnerability that allows remote attackers to execute non-allowlisted commands by exploiting improper ...
Original description
OpenClaw versions prior to 2026.2.22 in macOS node-host system.run contain an allowlist bypass vulnerability that allows remote attackers to execute non-allowlisted commands by exploiting improper parsing of command substitution tokens. Attackers can craft shell payloads with command substitution syntax within double-quoted text to bypass security restrictions and execute arbitrary commands on the system.
osv CVSS3.1 6.6
Vulnerability type
CWE-78 OS Command Injection
Published: 18 Mar 2026 · Updated: 18 Mar 2026 · First seen: 18 Mar 2026