SB2026041788 - Multiple vulnerabilities in OpenClaw



SB2026041788 - Multiple vulnerabilities in OpenClaw

Published: April 17, 2026

Security Bulletin ID SB2026041788
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) OS Command Injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary commands.

The vulnerability exists due to improper neutralization of special elements used in an os command in exec preflight handling when processing shell-wrapper and argv-level environment assignment forms. A remote attacker can supply crafted environment assignment input to execute arbitrary commands.

High-risk shell environment controls such as SHELLOPTS and PS4 are implicated by the advisory.


2) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to bypass approval authorization checks.

The vulnerability exists due to improper access control in helper-backed channel approval resolution when processing an empty resolved approver list. A remote user can resolve pending approvals using a known approval id to bypass approval authorization checks.

The issue affects senders outside the normal channel authorization gate.


3) Incorrect authorization (CVE-ID: N/A)

The vulnerability allows a remote user to execute unintended busybox or toybox applets.

The vulnerability exists due to incorrect authorization in exec approval binding when handling execution of busybox or toybox multi-call binaries. A remote user can invoke a busybox or toybox command to execute unintended busybox or toybox applets.

Opaque multi-call binaries can obscure which applet or script-like behavior will actually run.


Remediation

Install update from vendor's website.