OS Command Injection in OpenClaw - CVE-2026-22179
Published: May 1, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to execute unintended commands on the node host.
The vulnerability exists due to improper neutralization of special elements used in an os command in the system.run allowlist parsing on the macOS node-host path when processing double-quoted shell text containing command substitution in security=allowlist mode. A remote privileged user can send a specially crafted shell-wrapper command to execute unintended commands on the node host.
Exploitation requires the macOS node-host or companion-app execution path, security=allowlist, and ask mode set to on-miss or off.