CVE-2026-28391
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests (non-default configuration), allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metacharacters like & or %...% to execute unapproved commands beyond the allowlisted operations.
Analysis
Windows cmd.exe metacharacter injection in OpenClaw before 2026.2.2. Bypass exec whitelist. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all OpenClaw instances running versions prior to 2026.2.2 and audit which systems have allowlist-gated exec enabled. Within 7 days: Apply vendor patch to upgrade OpenClaw to version 2026.2.2 or later across all affected systems. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-qj77-c3c8-9c3q