Subs -30% SUB30
Three New CVEs Bypass OpenClaw's system.run Allowlist
$ ./blog/news
News

Three New CVEs Bypass OpenClaw's system.run Allowlist

ClawHosters
ClawHosters by Daniel Samer
3 min read

OpenClaw's system.run allowlist got broken three different ways in March 2026. The allowlist is supposed to block unapproved commands from running on your machine. It didn't. Three separate vulnerabilities, three different bypass techniques, one patch release.

All fixed in v2026.2.22. If you're on ClawHosters, you're already running a patched version.

What Happened

Security researchers found that OpenClaw's allowlist enforcement had blind spots. The allowlist checks which commands are approved before execution, but attackers found ways to slip past those checks entirely.

CVE CVSS What It Does
CVE-2026-27566 7.1 (HIGH) Wrapper chain depth exhaustion bypasses allowlist
CVE-2026-28460 5.9 (MEDIUM) Shell line-continuation smuggles commands past static analysis
CVE-2026-29607 6.4 (MEDIUM) Approve one command, execute anything via cached wrapper trust

The worst one is CVE-2026-27566. CVSS 7.1, network-accessible, low privileges required, no user interaction needed. That's about as bad as it gets for a tool running on your local machine.

How the Bypasses Work

Each CVE targets the same subsystem but uses a different trick. The VulnCheck advisory for CVE-2026-29607 explains the wrapper persistence issue well: an attacker gets approval for a harmless wrapped command, then swaps in a malicious payload through the same trusted wrapper. OpenClaw cached trust at the wrapper level, not the inner command. Approve once, run anything.

CVE-2026-28460 is more clever. It abuses shell line-continuation characters to split a command substitution across lines, fooling OpenClaw's static analysis into seeing an allowlisted binary while the shell actually executes something else.

The Bigger Picture

These three CVEs are part of a larger pattern. Jerry Gamblin's OpenClaw CVE tracker now monitors over 156 advisories, only 28 of which have assigned CVE IDs. Cyera Research found 24,478 internet-connected OpenClaw instances via Shodan. Belgium's Centre for Cybersecurity has issued government-level patch advisories.

Windows users need a separate fix: the batch CVEs (CVE-2026-31990 through CVE-2026-32000) require v2026.3.2.

ClawHosters Customers: You're Patched

ClawHosters auto-updates all managed instances. Your instance is already running a version above v2026.2.22. You don't need to track 156 advisories manually. That's the point of managed hosting.

Self-hosting? Check your version and update. For a deeper look at OpenClaw's security posture, read our security hardening guide or the safety scanner post.

Frequently Asked Questions

No public exploits have been confirmed yet, but with 24,478 exposed instances and detailed advisories published, the attack surface is real. Patch now if you self-host.

Version 2026.2.22 patches CVE-2026-27566, CVE-2026-28460, and CVE-2026-29607. Windows users should update to v2026.3.2 for the additional batch script vulnerabilities.

No. ClawHosters auto-updates all instances. Your deployment was patched automatically. You can verify your current version in the ClawHosters dashboard.
*Last updated: March 2026*

Sources

  1. 1 CVE-2026-27566
  2. 2 VulnCheck advisory for CVE-2026-29607
  3. 3 Jerry Gamblin's OpenClaw CVE tracker
  4. 4 Cyera Research
  5. 5 Belgium's Centre for Cybersecurity
  6. 6 managed hosting
  7. 7 security hardening guide
  8. 8 safety scanner post
  9. 9 ClawHosters dashboard