#VU125134 Interpretation Conflict in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to bypass allowlist restrictions and persist unauthorized follow-up commands.
The vulnerability exists due to interpretation conflict in the system.run allowlist analysis when deriving allow-always persistence entries for shell commands containing unquoted comments. A remote user can submit a shell command with an unquoted # before a chained payload to bypass allowlist restrictions and persist unauthorized follow-up commands.
The runtime shell executes only the pre-comment portion, while the non-executed tail may still be analyzed and stored as trusted.