CVE-2026-22217
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
18/03/2026
Last modified:
25/03/2026
Description
OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-prefix fallback logic for the $SHELL variable. An attacker can influence the $SHELL environment variable on systems with writable trusted-prefix directories such as /opt/homebrew/bin to execute arbitrary binaries in the OpenClaw process context.
Impact
Base Score 4.0
5.80
Severity 4.0
MEDIUM
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | 2026.2.22 (including) | 2026.2.23 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



