CVE-2026-32052
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
21/03/2026
Last modified:
23/03/2026
Description
OpenClaw versions prior to 2026.2.24 contain a command injection vulnerability in the system.run shell-wrapper that allows attackers to execute hidden commands by injecting positional argv carriers after inline shell payloads. Attackers can craft misleading approval text while executing arbitrary commands through trailing positional arguments that bypass display context validation.
Impact
Base Score 4.0
5.80
Severity 4.0
MEDIUM
Base Score 3.x
6.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | 2026.2.24 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/openclaw/openclaw/commit/0f0a680d3df81739ea5088a2f88e65f938b7936b
- https://github.com/openclaw/openclaw/commit/55cf92578d266987e390c4bf688196af98eac748
- https://github.com/openclaw/openclaw/security/advisories/GHSA-6rcp-vxwf-3mfp
- https://www.vulncheck.com/advisories/openclaw-hidden-command-execution-via-shell-wrapper-positional-argv-carriers



