LeakyCreds
NewInstant webhook alerts now available โ€” notified within seconds of any credential detection.Learn more โ†’
Home / Vulnerability Intelligence / CVE-2026-28363

CVE-2026-28363 - Vulnerability Analysis

CriticalCVSS: 9.9

Last Updated: February 27, 2026

OpenClaw - Command Injection

Published: February 27, 2026Updated: February 27, 2026Remote Exploitable

Overview

OpenClaw < 2026.2.23 contains a command injection caused by bypassing tools.exec.safeBins validation via GNU long-option abbreviations in allowlist mode, letting attackers execute commands without approval, exploit requires allowlist mode enabled.

Severity & Score

Severity: Critical
CVSS Score: 9.9
EPSS Score: 8.9%(Probability of exploitation in next 30 days)

Impact

Attackers can execute commands without approval, potentially leading to unauthorized command execution.

Mitigation

Update to version 2026.2.23 or later.

Social Media Activity(1 post)

Raphael
Raphael
@0x3e4
Feb 27, 2026

another day another critical vulnerability in openclaw ๐Ÿฅฒ๐Ÿคก "In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval." ๐Ÿ” CVE-2026-28363 ๐Ÿ“Š CVSS: 9.9 ยท Critical ๐Ÿ“… 02/27/2026, 04:16 AM ๐Ÿ›ก๏ธ CWE: CWE-184 ๐Ÿ“ฆ Affected: OpenClaw OpenClaw (< 2026.2.23) ๐Ÿ”— https://hecate.pw/vulnerability/CVE-2026-28363 #cve #vulnerability #hecate

View original post

Details

CVE ID
CVE-2026-28363
Severity
Critical
CVSS Score
9.9
Type
command_injection
Status
confirmed
EPSS
8.9%
Social Posts
1

CWE

  • CWE-184

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

8.9%Probability of exploitation in the next 30 days