CVE-2026-28363

🚨 CRITICAL

In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free executio...

Published
Feb 27, 2026
Last Modified
Feb 27, 2026
Views
29
Bookmarks
0

In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.

Affected Products (1)

openclaw - openclaw

Version: *

CVSS Scores

CVSS 3.1 9.9
9.9
CRITICAL
CVSS 2.0 9.9

References

Additional Information

Source
cve@mitre.org
State
Analyzed

Share CVE-2026-28363

Share on Social Media

Copy Link

Embed Code

Request Expert Analysis

Request a professional security analysis for CVE-2026-28363 from our verified experts.

Credits System

Use your credits to get expert analysis from verified security professionals. Purchase more credits anytime!

Add 3 credits for accelerated delivery

Base Cost: 8 credits
Priority Upgrade: + credits
SLA Acceleration: +3 credits
Total Cost:
Your Balance:

Insufficient Credits

You need more credits to submit this request.

Buy Credits

Report Analysis