CVE-2026-28363 - Vulnerability Analysis
CriticalCVSS: 9.9Last Updated: February 27, 2026
OpenClaw - Command Injection
Overview
OpenClaw < 2026.2.23 contains a command injection caused by bypassing tools.exec.safeBins validation via GNU long-option abbreviations in allowlist mode, letting attackers execute commands without approval, exploit requires allowlist mode enabled.
Severity & Score
Impact
Attackers can execute commands without approval, potentially leading to unauthorized command execution.
Mitigation
Update to version 2026.2.23 or later.
Social Media Activity(1 post)
another day another critical vulnerability in openclaw ๐ฅฒ๐คก "In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval." ๐ CVE-2026-28363 ๐ CVSS: 9.9 ยท Critical ๐ 02/27/2026, 04:16 AM ๐ก๏ธ CWE: CWE-184 ๐ฆ Affected: OpenClaw OpenClaw (< 2026.2.23) ๐ https://hecate.pw/vulnerability/CVE-2026-28363 #cve #vulnerability #hecate
View original postRelated Resources
Details
- CVE ID
- CVE-2026-28363
- Severity
- Critical
- CVSS Score
- 9.9
- Type
- command_injection
- Status
- confirmed
- EPSS
- 8.9%
- Social Posts
- 1
CWE
- CWE-184
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H