CVE-2026-28363
Received Received - Intake
Bypass of SafeBins Validation in OpenClaw Enables Unauthorized Execution

Publication date: 2026-02-27

Last updated on: 2026-02-27

Assigner: MITRE

Description
In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-27
Last Modified
2026-02-27
Generated
2026-05-07
AI Q&A
2026-02-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.23 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-184 The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenClaw versions before 2026.2.23. It involves the tools.exec.safeBins validation for the 'sort' command, which was intended to restrict execution to approved commands only. However, this validation could be bypassed using GNU long-option abbreviations, such as '--compress-prog', in allowlist mode. Because only the exact string '--compress-program' was denied, these abbreviations allowed execution paths that should have required approval to run without it.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized execution of commands that were supposed to be restricted or require approval. This can result in an attacker or unauthorized user executing potentially harmful commands without proper authorization, leading to a complete compromise of confidentiality, integrity, and availability of the affected system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart