PT-2026-27240 · Openclaw · Openclaw
Tdjackey
·
Published
2026-03-23
·
Updated
2026-03-23
·
CVE-2026-32908
CVSS v3.1
7.0
High
| AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
OpenClaw 2026.1.21 before 2026.2.19 contains a command injection vulnerability in the Lobster extension's Windows shell fallback mechanism that allows local operators to execute arbitrary commands. When spawn failures trigger shell fallback with shell: true, tool-provided arguments are interpreted by cmd.exe, enabling command injection through workflow-controlled parameters.
Fix
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw