Untriaged
Permalink
CVE-2026-34425
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
OpenClaw - Shell-Bleed Protection Preflight Validation Bypass
OpenClaw versions prior to commit 8aceaf5 contain a preflight validation bypass vulnerability in shell-bleed protection that allows attackers to execute blocked script content by using piped or complex command forms that the parser fails to recognize. Attackers can craft commands such as piped execution, command substitution, or subshell invocation to bypass the validateScriptFileForShellBleed() validation checks and execute arbitrary script content that would otherwise be blocked.
References
-
GitHub Security Advisory (GHSA-h3x4-hc5v-v2gm) vendor-advisory
-
Patch Commit #1 patch
-
https://www.vulncheck.com/advisories/openclaw-shell-bleed-protection-preflight-… third-party-advisory
Affected products
OpenClaw
- <8aceaf5d0f0ec552b75a792f7f0a3bfa5b091513
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>