Description
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests (non-default configuration), allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metacharacters like & or %...% to execute unapproved commands beyond the allowlisted operations.
Problem types
Incomplete List of Disallowed Inputs
Product status
Any version before 2026.2.2
Credits
Petr Simecek (@simecek)
Stanislav Fort, Aisle Research, www.aisle.com
References
github.com/...enclaw/security/advisories/GHSA-qj77-c3c8-9c3q (GitHub Security Advisory (GHSA-qj77-c3c8-9c3q))
github.com/...ommit/a7f4a53ce80c98ba1452eb90802d447fca9bf3d6 (Patch Commit)
www.vulncheck.com/...parsing-bypass-in-allowlist-enforcement (VulnCheck Advisory: OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcement)