CVE-2026-28463 - Vulnerability Analysis
HighCVSS: 8.4Last Updated: March 5, 2026
OpenClaw exec-approvals - Information Disclosure
Overview
OpenClaw exec-approvals allowlist mode contains an information disclosure vulnerability caused by pre-expansion validation of argv tokens but real shell expansion during execution, letting authorized callers or attackers with prompt-injection read arbitrary local files, exploit requires host execution enabled in allowlist mode.
Severity & Score
Impact
Attackers can read arbitrary local files accessible to the gateway or node process, leading to sensitive information disclosure.
Mitigation
Disable host execution in allowlist mode or apply patches that correctly validate shell expansions; otherwise, update to the latest version.
References
Social Media Activity(1 post)
š CVE-2026-28463 - High (8.4) OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized... š https://www.thehackerwire.com/vulnerability/CVE-2026-28463/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-28463
- Severity
- High
- CVSS Score
- 8.4
- Type
- undefined
- Status
- new
- EPSS
- 2.0%
- Social Posts
- 1
CWE
- CWE-78
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H