Home

Description

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode.

PUBLISHED Reserved 2026-03-10 | Published 2026-03-11 | Updated 2026-03-11 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Incorrect Authorization

Product status

Default status
unaffected

2026.2.22-2 (semver) before 2026.2.23
affected

2026.2.23
unaffected

Credits

@tdjackey reporter

References

github.com/...enclaw/security/advisories/GHSA-3c6h-g97w-fg78 (GitHub Security Advisory (GHSA-3c6h-g97w-fg78)) vendor-advisory

github.com/...ommit/3b8e33037ae2e12af7beb56fcf0346f1f8cbde6f (Patch Commit) patch

www.vulncheck.com/...ption-abbreviation-in-toolsexecsafebins (VulnCheck Advisory: OpenClaw 2026.2.22-2 < 2026.2.23 - Allowlist Bypass via sort Long-Option Abbreviation in tools.exec.safeBins) third-party-advisory

cve.org (CVE-2026-32059)

nvd.nist.gov (CVE-2026-32059)

Download JSON