CVE-2026-28363
Bypass of SafeBins Validation in OpenClaw Enables Unauthorized Execution
Publication date: 2026-02-27
Last updated on: 2026-02-27
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.2.23 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-184 | The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions before 2026.2.23. It involves the tools.exec.safeBins validation for the 'sort' command, which was intended to restrict execution to approved commands only. However, this validation could be bypassed using GNU long-option abbreviations, such as '--compress-prog', in allowlist mode. Because only the exact string '--compress-program' was denied, these abbreviations allowed execution paths that should have required approval to run without it.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized execution of commands that were supposed to be restricted or require approval. This can result in an attacker or unauthorized user executing potentially harmful commands without proper authorization, leading to a complete compromise of confidentiality, integrity, and availability of the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know