OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a command injection vulnerability in the Lobster extension's Windows shell fallback mechanism that allows attackers to inject arbitrary commands through tool-provided arguments. When spawn failures trigger shell fallback with shell: true, attackers can exploit cmd.exe command interpretation to execute malicious commands by controlling workflow arguments.
References
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-19 02:16
Updated : 2026-03-19 18:17
NVD link : CVE-2026-31995
Mitre link : CVE-2026-31995
CVE.ORG link : CVE-2026-31995
JSON object : View
Products Affected
microsoft
- windows
openclaw
- openclaw
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
