Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.6
OpenClaw: Authorized access can read sensitive local files
CVE-2026-28463
GHSA-xvhf-x56f-2hpp
Summary
A security issue in OpenClaw allows authorized users to access sensitive local files. This occurs when safe commands like 'head' or 'grep' can read files by using special characters or environment variables. To fix this, ensure you're not using host execution in allowlist mode or update to a patched version of OpenClaw.
What to do
- Update steipete openclaw to version 2026.2.14.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| steipete | openclaw | <= 2026.2.14 | 2026.2.14 |
| openclaw | openclaw | <= 2026.2.14 | – |
Original title
OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via ...
Original description
OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.
nvd CVSS3.1
8.4
nvd CVSS4.0
8.6
Vulnerability type
CWE-78
OS Command Injection
- https://github.com/openclaw/openclaw/commit/77b89719d5b7e271f48b6f49e334a8b99146...
- https://github.com/openclaw/openclaw/security/advisories/GHSA-xvhf-x56f-2hpp
- https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-shell-expa...
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.14
- https://nvd.nist.gov/vuln/detail/CVE-2026-28463
- https://github.com/advisories/GHSA-xvhf-x56f-2hpp
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026