GHSA-qj77-c3c8-9c3q

Suggest an improvement
Source
https://github.com/advisories/GHSA-qj77-c3c8-9c3q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-qj77-c3c8-9c3q/GHSA-qj77-c3c8-9c3q.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qj77-c3c8-9c3q
Aliases
Published
2026-02-17T16:44:11Z
Modified
2026-03-10T18:47:20.506886Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 7.4 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenClaw's Windows cmd.exe parsing may bypass exec allowlist/approval gating
Details

Summary

On Windows nodes, exec requests were executed via cmd.exe /d /s /c <rawCommand>. In allowlist/approval-gated mode, the allowlist analysis did not model Windows cmd.exe parsing and metacharacter behavior. A crafted command string could cause cmd.exe to interpret additional operations (for example command chaining via &, or expansion via %...% / !...!) beyond what was allowlisted/approved.

Affected Packages / Versions

  • Package: openclaw (npm)
  • Affected: <= 2026.2.1
  • Patched: >= 2026.2.2
  • Latest (npm) as of 2026-02-14: 2026.2.13

Details

  • Default installs: Not affected unless you opt into exec allowlist/approval gating on Windows nodes.
  • Windows execution uses cmd.exe via src/infra/node-shell.ts.
  • The fix hardens Windows allowlist enforcement by:
    • Passing the platform into allowlist analysis and rejecting Windows shell metacharacters.
    • Treating cmd.exe invocation as not allowlist-safe on Windows.
    • Avoiding cmd.exe entirely in allowlist mode by executing the parsed argv directly when possible.

Fix Commit(s)

  • a7f4a53ce80c98ba1452eb90802d447fca9bf3d6

Thanks @simecek for reporting.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2026-03-05T22:16:15Z",
    "cwe_ids": [
        "CWE-78"
    ],
    "github_reviewed_at": "2026-02-17T16:44:11Z",
    "severity": "HIGH"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.2.2

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-qj77-c3c8-9c3q/GHSA-qj77-c3c8-9c3q.json"