Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.9

OpenClaw 2026.2.19-2 allows attackers to execute arbitrary commands

CVE-2026-32063
Summary

OpenClaw versions prior to 2026.2.21 have a security flaw that allows an attacker to execute any command on your system if they can influence a specific configuration file. This is a serious issue, as it could give the attacker control over your system. To fix this, update to OpenClaw 2026.2.21 or later.

Original title
OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vulnerability in systemd unit file generation where attacker-controlled environment values are not validated for CR/LF c...
Original description
OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vulnerability in systemd unit file generation where attacker-controlled environment values are not validated for CR/LF characters, allowing newline injection to break out of Environment= lines and inject arbitrary systemd directives. An attacker who can influence config.env.vars and trigger service install or restart can execute arbitrary commands with the privileges of the OpenClaw gateway service user.
nvd CVSS3.1 7.1
nvd CVSS4.0 6.9
Vulnerability type
CWE-77 Command Injection
Published: 11 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026