Plattform
nodejs
Komponente
openclaw
Behoben in
2026.2.2
CVE-2026-28470 describes a command injection vulnerability discovered in OpenClaw, a Linux emulator. This flaw allows attackers to bypass the intended allowlist protection mechanism and execute arbitrary commands on the system. The vulnerability affects versions prior to 2026.2.2 and has been rated as CRITICAL with a CVSS score of 9.8. A patch has been released to address this issue.
The impact of this vulnerability is severe. Successful exploitation allows an attacker to gain complete control over the affected system. By injecting command substitution syntax (using $() or backticks) within double-quoted strings, an attacker can bypass the intended allowlist and execute arbitrary commands with the privileges of the OpenClaw process. This could lead to data breaches, system compromise, and potential lateral movement within the network. The ability to execute arbitrary commands effectively grants the attacker root access, enabling them to install malware, modify system configurations, or steal sensitive data.
CVE-2026-28470 was publicly disclosed on 2026-03-05. There is currently no indication of active exploitation in the wild, but the CRITICAL severity and ease of exploitation suggest it could become a target. No public proof-of-concept exploits have been released as of the time of writing, but the vulnerability's nature makes it likely that such exploits will emerge. It is not currently listed on the CISA KEV catalog.
Systems running OpenClaw, particularly those exposed to untrusted networks or user input, are at significant risk. Environments utilizing OpenClaw for critical infrastructure or sensitive data processing should prioritize patching. Shared hosting environments where OpenClaw is installed could also be affected if the host's security practices are inadequate.
• linux / server:
journalctl -u openclaw | grep -i "command substitution"
ps aux | grep openclaw | grep -i "$()"disclosure
Exploit-Status
EPSS
0.09% (26% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-28470 is to immediately upgrade OpenClaw to version 2026.2.2 or later. If upgrading is not immediately feasible, consider implementing strict input validation and sanitization on any user-supplied data that is processed by OpenClaw. While a direct WAF rule is unlikely to be effective due to the nature of the command injection, carefully reviewing and restricting the allowed characters within the exec approvals allowlist can provide a limited layer of defense. After upgrading, verify the fix by attempting to inject command substitution syntax into an OpenClaw process and confirming that the commands are not executed.
Actualice OpenClaw a la versión 2026.2.2 o superior para mitigar la vulnerabilidad. Esta actualización corrige el problema al escapar correctamente las sustituciones de comandos dentro de las cadenas entre comillas dobles, evitando la ejecución de comandos no autorizados.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-28470 is a critical vulnerability in OpenClaw allowing attackers to bypass the allowlist and execute arbitrary commands.
You are affected if you are running OpenClaw versions 0.0.0–2026.2.2. Check your version and upgrade immediately.
Upgrade OpenClaw to version 2026.2.2 or later. If immediate upgrade is not possible, implement temporary workarounds like restricting network access.
While no public exploits are currently known, the bypass nature of the vulnerability suggests a high risk of exploitation if unpatched.
Refer to the OpenClaw project's official website or security mailing list for the latest advisory and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.