PT-2026-5742 · Openclaw · Openclaw
Koko9Xxx
·
Published
2026-02-02
·
Updated
2026-03-18
·
CVE-2026-25157
CVSS v3.1
7.7
High
| Vector | AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
OpenClaw versions prior to 2026.1.29
Description
OpenClaw is a personal AI assistant with an OS command injection issue. The
sshNodeCommand function improperly escapes user-supplied project paths, leading to potential arbitrary command execution on the remote SSH host when the cd command fails. Additionally, the parseSSHTarget function lacks validation for SSH target strings, allowing an attacker to execute arbitrary commands on the local machine by crafting a target string starting with a dash, such as -oProxyCommand=.... The vulnerability exists in the macOS application's SSH remote connection handling within the CommandResolver.swift file. Exploitation can occur if an attacker can influence a user's remote connection settings.Recommendations
Upgrade to OpenClaw version 2026.1.29 or later.
Exploit
Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw