OS Command Injection in OpenClaw - #VU128810
Published: May 1, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to execute inline payloads.
The vulnerability exists due to improper neutralization of special elements used in an OS command in tools.exec.safeBins allowlist evaluation when processing configured interpreter-style binaries without an explicit safe-bin profile. A remote user can supply inline code through flags such as -c to execute inline payloads.
Only non-default deployments that explicitly add such binaries to safeBins in allowlist mode are vulnerable.