OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xvhf-x56f-2hpp | OpenClaw exec approvals: safeBins could bypass stdin-only constraints via shell expansion |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode. | |
| Title | OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T22:28:03.399Z
Reserved: 2026-02-27T19:18:27.709Z
Link: CVE-2026-28463
No data.
Status : Received
Published: 2026-03-05T22:16:19.127
Modified: 2026-03-05T22:16:19.127
Link: CVE-2026-28463
No data.
OpenCVE Enrichment
Updated: 2026-03-06T15:00:09Z
Weaknesses
Github GHSA