Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wpc6-37g7-8q4w | OpenClaw: Shell init-file options could satisfy exec allowlist script matching |
Fri, 01 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.31 contains an exec allowlist bypass vulnerability allowing attackers to inherit allowlist trust via shell init-file wrapper invocations. Attackers can exploit shell options like --rcfile, --init-file, and --startup-file to load attacker-chosen initialization files while bypassing exec allowlist matching restrictions. | |
| Title | OpenClaw < 2026.3.31 - Exec Allowlist Bypass via Shell Init-File Options | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-184 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T12:18:18.101Z
Reserved: 2026-04-20T14:13:45.348Z
Link: CVE-2026-41392
Updated: 2026-04-29T12:18:13.338Z
Status : Analyzed
Published: 2026-04-28T19:37:42.447
Modified: 2026-04-30T20:42:43.390
Link: CVE-2026-41392
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:15:43Z
Github GHSA