CVE-2026-22179 - Vulnerability Analysis
MediumCVSS: 6.6Last Updated: March 19, 2026
OpenClaw - Command Injection
Published: March 18, 2026Updated: March 19, 2026PoC AvailableRemote Exploitable
Overview
OpenClaw < 2026.2.22 in macOS node-host system.run contains a command injection caused by improper parsing of command substitution tokens, letting remote attackers execute arbitrary commands by bypassing allowlist, exploit requires crafted shell payloads with command substitution syntax.
Severity & Score
Severity: Medium
CVSS Score: 6.6
Impact
Remote attackers can execute arbitrary commands on the system, potentially leading to full system compromise.
Mitigation
Update to version 2026.2.22 or later.
References
Related Resources
Details
- CVE ID
- CVE-2026-22179
- Severity
- Medium
- CVSS Score
- 6.6
- Type
- command_injection
- Status
- confirmed
CWE
- CWE-78
CVSS Metrics
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H