CVE-2026-32059
Received Received - Intake
Command Injection via Inadequate Option Validation in OpenClaw Sort

Publication date: 2026-03-11

Last updated on: 2026-03-16

Assigner: VulnCheck

Description
OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-11
Last Modified
2026-03-16
Generated
2026-05-07
AI Q&A
2026-03-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.23 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenClaw versions prior to 2026.2.23, where the safeBins validation for the sort command fails to properly validate GNU long-option abbreviations. Attackers can exploit this by using abbreviated long options to bypass denied-flag checks, allowing them to execute sort commands without approval in allowlist mode.

The root cause is that the validation mechanism did not reject ambiguous or unknown abbreviated long options, enabling attackers to circumvent restrictions intended to block unsafe command-line arguments.


How can this vulnerability impact me? :

This vulnerability can allow remote attackers to execute sort commands with abbreviated long options that bypass security checks. This means attackers can run potentially unsafe or unauthorized commands that should have been blocked by the allowlist mode.

The impact includes unauthorized command execution, which can lead to security breaches such as data manipulation, unauthorized access, or disruption of normal operations.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'Detection of this vulnerability involves monitoring for usage of the sort command with abbreviated long options that bypass safeBins validation. Since the vulnerability allows remote attackers to execute sort commands with abbreviated long options to skip approval requirements, detection can focus on identifying such command-line arguments.'}, {'type': 'paragraph', 'content': 'Specifically, commands that use abbreviated or ambiguous long options for sort (e.g., --o instead of --output) should be flagged.'}, {'type': 'paragraph', 'content': 'You can use system auditing or command-line logging tools to capture invocations of sort with suspicious abbreviated options.'}, {'type': 'paragraph', 'content': 'Example commands to detect such usage might include:'}, {'type': 'list_item', 'content': "Using shell history or audit logs to grep for sort commands with abbreviated options: `grep -E 'sort.*--[a-z]+' /var/log/audit/audit.log`"}, {'type': 'list_item', 'content': 'Using process monitoring tools like `ps` or `pstree` combined with grep to find running sort commands with unusual flags.'}, {'type': 'list_item', 'content': 'Implementing custom scripts to parse command-line arguments and flag any abbreviated long options that are not fully spelled out.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade OpenClaw to version 2026.2.23 or later, where the safeBins validation for long options has been hardened to reject unknown or ambiguous abbreviated long options.

This update enforces strict fail-closed validation of long options, preventing attackers from bypassing denied-flag checks via abbreviated options.

Additionally, review and enforce the denied flags list for binaries like sort to block filesystem-dependent or unsafe flags such as --compress-program, --files0-from, --output, --random-source, and --temporary-directory.

If upgrading immediately is not possible, consider restricting access to the affected binaries or disabling allowlist mode temporarily to prevent exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart