Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xrgv-34cc-q765

Опубликовано: 19 мар. 2026
Источник: github
Github: Прошло ревью
CVSS4: 6
CVSS3: 5.9

Описание

Duplicate Advisory: OpenClaw's system.run allowlist bypass via shell line-continuation command substitution

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-9868-vxmx-w862. This link is maintained to preserve external references.

Original Description

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run that allows attackers to execute non-allowlisted commands by splitting command substitution using shell line-continuation characters. Attackers can bypass security analysis by injecting $\ followed by a newline and opening parenthesis inside double quotes, causing the shell to fold the line continuation into executable command substitution that circumvents approval boundaries.

Пакеты

Наименование

openclaw

npm
Затронутые версииВерсия исправления

Отсутствует

6 Medium

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-78

6 Medium

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-78