Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-28391 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OpenClaw fails to validate Windows `cmd.exe` metacharacters properly. πŸ“‰ **Consequences**: Attackers bypass command approval limits and execute unauthorized commands.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper input validation of shell metacharacters. ⚠️ **Flaw**: The allowlist enforcement logic is bypassed via `cmd.exe` parsing quirks.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users of **OpenClaw** (OpenClaw open-source AI assistant). πŸ“… **Versions**: All versions **prior to 2026.2.2**. 🏒 **Vendor**: OpenClaw.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: High. CVSS Score indicates **High** Confidentiality, Integrity, and Availability impact. πŸ•΅οΈ **Action**: Execute **unapproved commands** on the host.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **Low**. 🚫 **Auth**: No authentication required (PR:N). πŸ‘οΈ **UI**: No user interaction needed (UI:N). 🌍 **Vector**: Network accessible (AV:N). ⚑ **Complexity**: Low (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp**: No public PoC or exploit code listed in the data. πŸ“œ **References**: Only vendor advisory and patch commit links available. πŸ•΅οΈ **Status**: Theoretical/Unpatched exploitation risk exists.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for OpenClaw installations. πŸ“¦ **Version**: Verify if version < **2026.2.2**. πŸ› οΈ **Tool**: Use VulnCheck or GitHub Security Advisories to detect presence.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ“¦ **Patch**: Update to **OpenClaw 2026.2.2** or later. πŸ”— **Source**: Official patch commit available on GitHub (a7f4a53ce80c98ba1452eb90802d447fca9bf3d6).

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, restrict network access to OpenClaw services. πŸ›‘ **Mitigation**: Implement strict WAF rules to block `cmd.exe` metacharacter injection attempts.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **Critical**. πŸ“ˆ **CVSS**: High severity (H/H/H). ⏳ **Time**: Immediate patching recommended. 🚨 **Priority**: High. Do not ignore this vulnerability.