#VU125260 Incomplete List of Disallowed Inputs in OpenClaw

 

#VU125260 Incomplete List of Disallowed Inputs in OpenClaw

Published: April 8, 2026


Vulnerability identifier: #VU125260
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-184
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote user to bypass exec allowlist restrictions.

The vulnerability exists due to incomplete list of disallowed inputs in exec allowlist matching when processing shell-wrapper invocations with init-file options. A remote user can supply a shell-wrapper command using options such as --rcfile, --init-file, or --startup-file to bypass exec allowlist restrictions.

Only configurations with exec allowlist or allow-always behavior enabled are vulnerable, and exploitation requires the ability to steer a shell-wrapper command shape that uses init-file options.


Remediation

Install security update from vendor's website.

External links