Multiple vulnerabilities have been discovered in OpenClaw, a nodejs component, including command injection, authentication bypass, and sensitive file disclosure. These vulnerabilities could allow attackers to execute arbitrary code, bypass security checks, or access sensitive information. Users are advised to update to the latest versions of OpenClaw to mitigate these risks.
These vulnerabilities range in severity, with the most critical potentially leading to remote code execution.
What is Openclaw?
CVE-2026-28363: OpenClaw Validation Bypass via GNU Long-Option Abbreviations
Critical: Allows execution of unauthorized commands.
EPSS score of 0.036 indicates a low probability of exploitation.
OpenClaw's tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations in allowlist mode. This allowed unintended execution paths that should have required approval.
How to fix CVE-2026-28363 in OpenClaw
Patch immediately- 1.Update OpenClaw to version 2026.2.23 or later.
npm update openclawWorkaround: Avoid using GNU long-option abbreviations in allowlist mode configurations.
NextGuard automatically flags CVE-2026-28363 if OpenClaw appears in any of your monitored projects — no manual lookup required.
CVE-2026-28472: OpenClaw Gateway Connect Device Identity Check Bypass
Critical: Allows unauthorized access to the gateway.
EPSS score of 0.054 suggests a low probability of exploitation.
The gateway WebSocket connect handshake in OpenClaw could skip device identity checks if an auth.token was present but not yet validated. This allowed clients to connect without proper device identity verification.
How to fix CVE-2026-28472 in OpenClaw
Patch immediately- 1.Update OpenClaw to version 2026.2.2 or later.
npm update openclawWorkaround: Ensure the gateway WebSocket is only reachable from a trusted network and by trusted users. Restrict Tailnet users/ACLs when using Tailscale Serve.
CVE-2026-32030: OpenClaw Sensitive File Disclosure via stageSandboxMedia
High: Allows disclosure of sensitive files.
EPSS score of 0.068 indicates a low probability of exploitation.
OpenClaw's `stageSandboxMedia` function accepted arbitrary absolute paths when iMessage remote attachment fetching was enabled, leading to sensitive file disclosure. An attacker could influence inbound attachment path metadata to disclose files readable by the OpenClaw process on the remote host.
How to fix CVE-2026-32030 in OpenClaw
Patch within 7 days- 1.Update OpenClaw to version 2026.2.19 or later.
- 2.If remote attachments are not required, disable iMessage attachment ingestion.
- 3.Run OpenClaw under least privilege on the remote host.
npm update openclawWorkaround: Disable iMessage attachment ingestion if remote attachments are not required. Run OpenClaw under least privilege on the remote host.
CVE-2026-32056: OpenClaw Shell Startup Env Injection Bypasses system.run Allowlist
High: Allows remote code execution.
EPSS score of 0.143 suggests a moderate probability of exploitation.
OpenClaw's `system.run` environment sanitization allowed shell-startup environment overrides (HOME, ZDOTDIR), leading to command injection. Attackers could execute arbitrary code by controlling shell startup files before allowlist-evaluated command bodies.
How to fix CVE-2026-32056 in OpenClaw
Patch within 24h- 1.Update OpenClaw to version 2026.2.22 or later.
npm update openclawStay ahead of nodejs vulnerabilities
Proactively detect and remediate vulnerabilities in your nodejs projects. Use NextGuard to monitor your nodejs dependencies and receive alerts on new CVEs.
Compare PlansFrequently asked questions
Multiple vulnerabilities have been addressed in recent OpenClaw releases. It is crucial to update to the latest versions to ensure the security of your applications. See all nodejs vulnerabilities.
Related topics