Description
OpenClaw versions prior to 2026.2.19 contain a command injection vulnerability in the Lobster extension tool execution that uses Windows shell fallback with shell: true after spawn failures. Attackers can inject shell metacharacters in command arguments to execute arbitrary commands when subprocess launch fails with EINVAL or ENOENT errors.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Product status
Any version before 2026.2.19
2026.2.19 (semver)
Credits
Sean Nejad (@allsmog)
References
github.com/...enclaw/security/advisories/GHSA-7fcc-cw49-xm78 (GitHub Security Advisory (GHSA-7fcc-cw49-xm78))
github.com/...ommit/ba7be018da354ea9f803ed356d20464df0437916 (Patch Commit)
www.vulncheck.com/...hell-fallback-in-lobster-tool-execution (VulnCheck Advisory: OpenClaw < 2026.2.19 - Command Injection via Windows Shell Fallback in Lobster Tool Execution)