Описание
OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.
Ссылки
- Patch
- Vendor AdvisoryPatch
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2026.2.14 (исключая)
cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 4%
0.00018
Низкий
8.4 High
CVSS3
5.5 Medium
CVSS3
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 5.7
github
около 1 месяца назад
OpenClaw exec approvals: safeBins could bypass stdin-only constraints via shell expansion
EPSS
Процентиль: 4%
0.00018
Низкий
8.4 High
CVSS3
5.5 Medium
CVSS3
Дефекты
CWE-78