PT-2026-26738 · Openclaw · Openclaw
Tdjackey
·
Published
2026-03-21
·
Updated
2026-03-21
·
CVE-2026-32056
CVSS v3.1
7.5
High
| AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed.
Fix
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw