Логотип exploitDog
bind:CVE-2026-28463
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-28463

Количество 2

Количество 2

nvd логотип

CVE-2026-28463

28 дней назад

OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-xvhf-x56f-2hpp

около 1 месяца назад

OpenClaw exec approvals: safeBins could bypass stdin-only constraints via shell expansion

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-28463

OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.

CVSS3: 8.4
0%
Низкий
28 дней назад
github логотип
GHSA-xvhf-x56f-2hpp

OpenClaw exec approvals: safeBins could bypass stdin-only constraints via shell expansion

CVSS3: 5.7
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу