CVE-2026-32917
Received Received - Intake
Remote Command Injection in OpenClaw iMessage Attachment Staging

Publication date: 2026-03-31

Last updated on: 2026-04-02

Assigner: VulnCheck

Description
OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage attachment staging flow that allows attackers to execute arbitrary commands on configured remote hosts. The vulnerability exists because unsanitized remote attachment paths containing shell metacharacters are passed directly to the SCP remote operand without validation, enabling command execution when remote attachment staging is enabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.13 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32917 is a critical remote command injection vulnerability in OpenClaw versions before 2026.3.13. It occurs in the iMessage attachment staging process where unsanitized remote attachment paths containing shell metacharacters are passed directly to the SCP command without validation. This allows attackers to execute arbitrary commands on configured remote hosts remotely when remote attachment staging is enabled.

The root cause is that the remote attachment path is not properly sanitized before being used in an OS command, enabling command injection via shell metacharacters embedded in the attachment filename.

The vulnerability requires no privileges or user interaction and can lead to arbitrary command execution on remote hosts.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized remote command execution on configured hosts, which compromises confidentiality, integrity, and availability of systems.

  • Attackers can execute arbitrary commands remotely without any privileges or user interaction.
  • It can lead to full system compromise on the affected remote hosts.
  • The flaw can disrupt normal operations by allowing malicious commands to run, potentially causing data loss or service outages.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unsanitized remote attachment paths containing shell metacharacters being passed to SCP commands during iMessage attachment staging. Detection can focus on monitoring SCP command invocations with suspicious or unusual remote paths that contain shell metacharacters.

You can check for SCP commands running with suspicious arguments by using commands such as:

  • On Linux or Unix systems, use: ps aux | grep scp
  • Monitor SCP command arguments in real-time with: sudo auditctl -w /usr/bin/scp -p x -k scp_monitor
  • Search system logs for SCP usage with suspicious characters: grep -E '\$|;|`|\|' /var/log/syslog

Additionally, review iMessage attachment filenames or paths for shell metacharacters such as $, ;, `, |, &, <, >, and quotes, which are indicators of attempted exploitation.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade OpenClaw to version 2026.3.13 or later, where the vulnerability is fixed by strict validation and sanitization of SCP remote paths to reject any containing shell metacharacters.

If upgrading immediately is not possible, consider disabling the remote attachment staging feature in OpenClaw to prevent the vulnerable SCP command execution.

Additionally, monitor and restrict SCP command usage and audit logs for suspicious activity involving shell metacharacters in remote paths.

Implement network-level controls to limit access to configured remote hosts used by OpenClaw to reduce exposure.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows remote attackers to execute arbitrary commands on configured remote hosts, which can lead to a high impact on confidentiality, integrity, and availability of data.

Such a compromise could potentially result in unauthorized access to sensitive information, data breaches, or disruption of services, which may affect compliance with standards and regulations like GDPR and HIPAA that require protection of personal and sensitive data.

However, the provided information does not explicitly mention or analyze the direct impact of this vulnerability on compliance with specific regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart