CVE-2026-22217

Source
https://cve.org/CVERecord?id=CVE-2026-22217
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22217.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-22217
Aliases
Downstream
Published
2026-03-18T02:16:23.003Z
Modified
2026-04-10T05:41:18.899112Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-prefix fallback logic for the $SHELL variable. An attacker can influence the $SHELL environment variable on systems with writable trusted-prefix directories such as /opt/homebrew/bin to execute arbitrary binaries in the OpenClaw process context.

References

Affected packages

Git / github.com/openclaw/openclaw

Affected ranges

Type
GIT
Repo
https://github.com/openclaw/openclaw
Events
Database specific
{
    "versions": [
        {
            "introduced": "2026.2.22"
        },
        {
            "fixed": "2026.2.23"
        }
    ]
}

Affected versions

v2026.*
v2026.2.22
v2026.2.23-beta.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22217.json"