Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.8

OpenClaw allows malicious shell execution through Homebrew layout

GHSA-p4wh-cr8m-gm6c CVE-2026-22217
Summary

A vulnerability in OpenClaw allows an attacker to run malicious code if they can influence the system's shell. This could happen if an attacker can write a malicious program to a directory where OpenClaw trusts executables. To fix this, update to the latest version of OpenClaw, which no longer trusts executables in certain directories and instead falls back to a safe shell if none is specified.

What to do
  • Update steipete openclaw to version 2026.2.23.
Affected software
VendorProductAffected versionsFix available
steipete openclaw > 2026.2.22 , <= 2026.2.23 2026.2.23
Original title
OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-pref...
Original description
OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-prefix fallback logic for the $SHELL variable. An attacker can influence the $SHELL environment variable on systems with writable trusted-prefix directories such as /opt/homebrew/bin to execute arbitrary binaries in the OpenClaw process context.
osv CVSS4.0 8.4
Vulnerability type
CWE-184
CWE-829
Published: 18 Mar 2026 · Updated: 18 Mar 2026 · First seen: 18 Mar 2026