LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-28463

CVE-2026-28463 - Vulnerability Analysis

HighCVSS: 8.4

Last Updated: March 5, 2026

OpenClaw exec-approvals - Information Disclosure

Published: March 5, 2026Updated: March 5, 2026

Overview

OpenClaw exec-approvals allowlist mode contains an information disclosure vulnerability caused by pre-expansion validation of argv tokens but real shell expansion during execution, letting authorized callers or attackers with prompt-injection read arbitrary local files, exploit requires host execution enabled in allowlist mode.

Severity & Score

Severity: High
CVSS Score: 8.4
EPSS Score: 2.0%(Probability of exploitation in next 30 days)

Impact

Attackers can read arbitrary local files accessible to the gateway or node process, leading to sensitive information disclosure.

Mitigation

Disable host execution in allowlist mode or apply patches that correctly validate shell expansions; otherwise, update to the latest version.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 6, 2026

🟠 CVE-2026-28463 - High (8.4) OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-28463/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-28463
Severity
High
CVSS Score
8.4
Type
undefined
Status
new
EPSS
2.0%
Social Posts
1

CWE

  • CWE-78

CVSS Metrics

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

2.0%Probability of exploitation in the next 30 days