Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vmqr-rc7x-3446 | OpenClaw's non-default safeBins sort configuration can bypass intended allowlist approval constraints |
Wed, 25 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 18 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safeBins configuration that allows attackers to invoke external helpers through the compress-program option. When sort is explicitly added to tools.exec.safeBins, remote attackers can bypass intended safe-bin approval constraints by leveraging the compress-program parameter to execute unauthorized external programs. | |
| Title | OpenClaw < 2026.2.22 - Allowlist Bypass via sort Configuration in safeBins | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-25T14:32:16.170Z
Reserved: 2026-01-06T16:47:17.179Z
Link: CVE-2026-22169
Updated: 2026-03-18T14:04:54.025Z
Status : Modified
Published: 2026-03-18T02:16:20.893
Modified: 2026-03-25T15:16:35.977
Link: CVE-2026-22169
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:53:46Z
Github GHSA