EUVD-2026-14590

| CVE-2026-32908 HIGH
2026-03-23 VulnCheck GHSA-q528-m8hg-cjmr
7.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
EUVD ID Assigned
Mar 23, 2026 - 22:00 euvd
EUVD-2026-14590
Analysis Generated
Mar 23, 2026 - 22:00 vuln.today
Patch Released
Mar 23, 2026 - 22:00 nvd
Patch available
CVE Published
Mar 23, 2026 - 21:36 nvd
HIGH 7.0

Description

OpenClaw 2026.1.21 before 2026.2.19 contains a command injection vulnerability in the Lobster extension's Windows shell fallback mechanism that allows local operators to execute arbitrary commands. When spawn failures trigger shell fallback with shell: true, tool-provided arguments are interpreted by cmd.exe, enabling command injection through workflow-controlled parameters.

Analysis

OpenClaw 2026.1.21 through 2026.2.18 contains a command injection vulnerability in the Lobster extension's Windows shell fallback mechanism. Local authenticated users with low privileges can execute arbitrary commands when spawn failures trigger shell fallback with cmd.exe, exploiting workflow-controlled parameters. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all systems running OpenClaw versions 2026.1.21 through 2026.2.18 and assess their criticality level. Within 7 days: Apply the available vendor patch to all non-production instances and conduct testing in a staging environment. …

Sign in for detailed remediation steps.

Priority Score

35
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +35
POC: 0

Share

EUVD-2026-14590 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy