Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7977-c43c-xpwj | OpenClaw is vulnerable to validation bypass through GNU long-option abbreviations in allowlist mode |
Sat, 18 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unsafe SafeBins Validation in OpenClaw Sort Enables Execution of Unapproved Commands |
Fri, 27 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
Fri, 27 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Vendors & Products |
Openclaw
Openclaw openclaw |
Fri, 27 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied. | |
| Weaknesses | CWE-184 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-27T15:47:06.970Z
Reserved: 2026-02-27T03:17:37.164Z
Link: CVE-2026-28363
Updated: 2026-02-27T15:47:03.257Z
Status : Analyzed
Published: 2026-02-27T04:16:03.227
Modified: 2026-02-27T19:13:57.257
Link: CVE-2026-28363
No data.
OpenCVE Enrichment
Updated: 2026-04-18T10:30:35Z
Github GHSA