CVSS 9.9CVE-2026-28363CVE-2026-28472CVE-2026-32030

Multiple Vulnerabilities Patched in OpenClaw

Critical vulnerabilities patched in OpenClaw. Includes command injection, auth bypass, and file disclosure. Update to latest versions now!

Published on

Multiple vulnerabilities have been discovered in OpenClaw, a nodejs component, including command injection, authentication bypass, and sensitive file disclosure. These vulnerabilities could allow attackers to execute arbitrary code, bypass security checks, or access sensitive information. Users are advised to update to the latest versions of OpenClaw to mitigate these risks.

These vulnerabilities range in severity, with the most critical potentially leading to remote code execution.

What is Openclaw?

Openclaw is a component for nodejs, likely used in various applications to provide specific functionalities. Due to its role in handling potentially sensitive operations, vulnerabilities in Openclaw can have significant security implications for applications that depend on it. To learn more, you can search all openclaw CVEs.

CVE-2026-28363: OpenClaw Validation Bypass via GNU Long-Option Abbreviations

CVSS9.9
Affected versionsOpenClaw versions prior to 2026.2.23 are affected when using allowlist mode and relying on exact string matching for command-line options.

Critical: Allows execution of unauthorized commands.

EPSS score of 0.036 indicates a low probability of exploitation.

OpenClaw's tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations in allowlist mode. This allowed unintended execution paths that should have required approval.

How to fix CVE-2026-28363 in OpenClaw

Patch immediately
  1. 1.Update OpenClaw to version 2026.2.23 or later.
Update OpenClaw
npm update openclaw

Workaround: Avoid using GNU long-option abbreviations in allowlist mode configurations.

NextGuard automatically flags CVE-2026-28363 if OpenClaw appears in any of your monitored projects — no manual lookup required.

CVE-2026-28472: OpenClaw Gateway Connect Device Identity Check Bypass

CVSS9.8
Affected versionsOpenClaw versions 2026.2.1 and earlier are affected in deployments where the gateway WebSocket is reachable and connections can be authorized via Tailscale without validating the shared secret.

Critical: Allows unauthorized access to the gateway.

EPSS score of 0.054 suggests a low probability of exploitation.

The gateway WebSocket connect handshake in OpenClaw could skip device identity checks if an auth.token was present but not yet validated. This allowed clients to connect without proper device identity verification.

How to fix CVE-2026-28472 in OpenClaw

Patch immediately
  1. 1.Update OpenClaw to version 2026.2.2 or later.
Update OpenClaw
npm update openclaw

Workaround: Ensure the gateway WebSocket is only reachable from a trusted network and by trusted users. Restrict Tailnet users/ACLs when using Tailscale Serve.

CVE-2026-32030: OpenClaw Sensitive File Disclosure via stageSandboxMedia

CVSS7.5
Affected versionsOpenClaw versions up to and including 2026.2.17 are affected when iMessage attachments are enabled, remote attachment mode is active, and an attacker can inject/tamper with attachment path metadata.

High: Allows disclosure of sensitive files.

EPSS score of 0.068 indicates a low probability of exploitation.

OpenClaw's `stageSandboxMedia` function accepted arbitrary absolute paths when iMessage remote attachment fetching was enabled, leading to sensitive file disclosure. An attacker could influence inbound attachment path metadata to disclose files readable by the OpenClaw process on the remote host.

How to fix CVE-2026-32030 in OpenClaw

Patch within 7 days
  1. 1.Update OpenClaw to version 2026.2.19 or later.
  2. 2.If remote attachments are not required, disable iMessage attachment ingestion.
  3. 3.Run OpenClaw under least privilege on the remote host.
Update OpenClaw
npm update openclaw

Workaround: Disable iMessage attachment ingestion if remote attachments are not required. Run OpenClaw under least privilege on the remote host.

CVE-2026-32056: OpenClaw Shell Startup Env Injection Bypasses system.run Allowlist

CVSS7.5
Affected versionsOpenClaw versions 2026.2.21-2 and earlier are affected. This vulnerability can be exploited if an attacker can control the HOME or ZDOTDIR environment variables.

High: Allows remote code execution.

EPSS score of 0.143 suggests a moderate probability of exploitation.

OpenClaw's `system.run` environment sanitization allowed shell-startup environment overrides (HOME, ZDOTDIR), leading to command injection. Attackers could execute arbitrary code by controlling shell startup files before allowlist-evaluated command bodies.

How to fix CVE-2026-32056 in OpenClaw

Patch within 24h
  1. 1.Update OpenClaw to version 2026.2.22 or later.
Update OpenClaw
npm update openclaw

Stay ahead of nodejs vulnerabilities

Proactively detect and remediate vulnerabilities in your nodejs projects. Use NextGuard to monitor your nodejs dependencies and receive alerts on new CVEs.

Compare Plans

Frequently asked questions

Multiple vulnerabilities have been addressed in recent OpenClaw releases. It is crucial to update to the latest versions to ensure the security of your applications. See all nodejs vulnerabilities.

Related topics

nodejsvulnerabilitysecurityopenclawpatch