Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-28363 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OpenClaw (pre-2026.2.23) has a critical flaw in `tools.exec.safeBins`. <br>πŸ’₯ **Consequences**: Attackers can bypass safety checks. This leads to **unauthorized code execution**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-184** (Incomplete List of Disallowed Inputs). <br>πŸ” **Flaw**: The validation logic for `safeBins` is insufficient. It fails to block malicious inputs effectively, allowing bypass.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **OpenClaw** by vendor OpenClaw. <br>πŸ“… **Versions**: All versions **before 2026.2.23**. <br>⚠️ **Component**: The `tools.exec` module specifically.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: High Impact. CVSS Score indicates **High** Confidentiality, Integrity, and Availability impact. <br>πŸ“‚ **Data**: Attackers can execute arbitrary code.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Threshold**: **Low**. <br>πŸ“ **Config**: CVSS `PR:L` (Low Privileges) required. `AV:N` (Network) and `UI:N` (No User Interaction). <br>πŸš€ **Ease**: `AC:L` (Low Complexity). Easy to exploit if network access exists.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Public Exp?**: **No**. <br>πŸ“„ **PoC**: The `pocs` field is empty. <br>🌍 **Wild Exp**: No reports of wild exploitation yet. However, the low complexity makes it a prime target.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Check your OpenClaw version. <br>πŸ“‰ **Scan**: Look for versions **< 2026.2.23**. <br>πŸ› οΈ **Feature**: Inspect `tools.exec.safeBins` configuration. Ensure strict input validation is in place.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: **Yes**. <br>🩹 **Patch**: Update to **OpenClaw 2026.2.23** or later. <br>πŸ“’ **Source**: See GitHub Advisory GHSA-3c6h-g97w-fg78 for official details.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Implement strict **Input Validation**. <br>πŸ›‘ **Workaround**: Restrict `safeBins` to a known-good whitelist. Disable `tools.exec` if not needed. Apply network segmentation.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **Critical**. <br>🚨 **Priority**: Patch immediately. <br>⏳ **Reason**: CVSS is High. Network-accessible. Low exploitation barrier. Do not wait for PoC.