๐Ÿ” CVE Alert

CVE-2026-22168

MEDIUM 6.5

OpenClaw < 2026.2.21 - Command Injection via cmd.exe /c Trailing Arguments in system.run

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

OpenClaw versions prior to 2026.2.21 contain an approval-integrity mismatch vulnerability in system.run that allows authenticated operators to execute arbitrary trailing arguments after cmd.exe /c while approval text reflects only a benign command. Attackers can smuggle malicious arguments through cmd.exe /c to achieve local command execution on trusted Windows nodes with mismatched audit logs.

CWE CWE-88
Vendor openclaw
Product openclaw
Published Mar 18, 2026
Last Updated Mar 18, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new medium vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

OpenClaw / OpenClaw
0 < 2026.2.21

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-5v6x-rfc3-7qfr github.com: https://github.com/openclaw/openclaw/commit/6007941f04df1edcca679dd6c95949744fdbd4df vulncheck.com: https://www.vulncheck.com/advisories/openclaw-command-injection-via-cmd-exe-c-trailing-arguments-in-system-run

Credits

๐Ÿ” tdjackey