CVE-2026-32059

HIGH

OpenClaw <2026.2.23 - Command Injection

Title source: llm
STIX 2.1

Description

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode.

Scores

CVSS v3 8.8
EPSS 0.0007
EPSS Percentile 22.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-863
Status published
Products (2)
npm/openclaw 0 - 2026.2.23npm
openclaw/openclaw < 2026.2.23
Published Mar 11, 2026
Tracked Since Mar 11, 2026