Description
OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run exec analysis that fails to unwrap env and shell-dispatch wrapper chains. Attackers can route execution through wrapper binaries like env bash to smuggle payloads that satisfy allowlist entries while executing non-allowlisted commands.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Product status
Any version before 2026.2.22
Credits
tdjackey
References
github.com/...enclaw/security/advisories/GHSA-jj82-76v6-933r (GitHub Security Advisory (GHSA-jj82-76v6-933r))
github.com/...ommit/2b63592be57782c8946e521bc81286933f0f99c7 (Patch Commit)
www.vulncheck.com/...wrapper-binary-unwrapping-in-system-run (VulnCheck Advisory: OpenClaw < 2026.2.22 - Allowlist Bypass via Wrapper Binary Unwrapping in system.run)