Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.8
OpenClaw allows malicious shell execution through Homebrew layout
GHSA-p4wh-cr8m-gm6c
CVE-2026-22217
Summary
A vulnerability in OpenClaw allows an attacker to run malicious code if they can influence the system's shell. This could happen if an attacker can write a malicious program to a directory where OpenClaw trusts executables. To fix this, update to the latest version of OpenClaw, which no longer trusts executables in certain directories and instead falls back to a safe shell if none is specified.
What to do
- Update steipete openclaw to version 2026.2.23.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| steipete | openclaw | > 2026.2.22 , <= 2026.2.23 | 2026.2.23 |
Original title
OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-pref...
Original description
OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-prefix fallback logic for the $SHELL variable. An attacker can influence the $SHELL environment variable on systems with writable trusted-prefix directories such as /opt/homebrew/bin to execute arbitrary binaries in the OpenClaw process context.
osv CVSS4.0
8.4
Vulnerability type
CWE-184
CWE-829
Published: 18 Mar 2026 · Updated: 18 Mar 2026 · First seen: 18 Mar 2026