CVE-2026-28463

HIGH

OpenClaw - Info Disclosure

Title source: llm
STIX 2.1

Description

OpenClaw versions prior to 2026.2.14 contain an arbitrary file read vulnerability in the exec-approvals allowlist validation that checks pre-expansion argv tokens but executes using real shell expansion. Attackers with authorization or through prompt-injection attacks can exploit safe binaries like head, tail, or grep with glob patterns or environment variables to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.

Scores

CVSS v3 8.4
EPSS 0.0002
EPSS Percentile 5.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (3)
npm/openclaw 0 - 2026.2.14npm
openclaw/openclaw < 2026.2.14
OpenClaw/OpenClaw < 2026.2.14
Published Mar 05, 2026
Tracked Since Mar 06, 2026