PT-2026-27227 · Openclaw · Openclaw
Tdjackey
·
Published
2026-03-23
·
Updated
2026-03-23
·
CVE-2026-32047
CVSS v3.1
5.8
Medium
| AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L |
OpenClaw before 2026.2.22 contains an allowlist bypass vulnerability in system.run that allows attackers to execute non-allowlisted commands by splitting command substitution using shell line-continuation. Attackers can bypass shell-wrapper analysis by injecting $ followed by newline and ( inside double quotes, causing the shell runtime to fold the payload into $(...)and execute arbitrary subcommands.
Fix
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw