Home

Description

OpenClaw versions prior to commit 8aceaf5 contain a preflight validation bypass vulnerability in shell-bleed protection that allows attackers to execute blocked script content by using piped or complex command forms that the parser fails to recognize. Attackers can craft commands such as piped execution, command substitution, or subshell invocation to bypass the validateScriptFileForShellBleed() validation checks and execute arbitrary script content that would otherwise be blocked.

PUBLISHED Reserved 2026-03-27 | Published 2026-04-02 | Updated 2026-04-03 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-184 Incomplete List of Disallowed Inputs

Product status

Default status
unaffected

Any version before 8aceaf5d0f0ec552b75a792f7f0a3bfa5b091513
affected

Credits

Zhijie Zhang reporter

References

github.com/...enclaw/security/advisories/GHSA-fvx6-pj3r-5q4q (GitHub Security Advisory (GHSA-h3x4-hc5v-v2gm)) vendor-advisory

github.com/...ommit/8aceaf5d0f0ec552b75a792f7f0a3bfa5b091513 (Patch Commit #1) patch

www.vulncheck.com/...-protection-preflight-validation-bypass third-party-advisory

cve.org (CVE-2026-34425)

nvd.nist.gov (CVE-2026-34425)

Download JSON