CVE-2026-32056: OpenClaw's shell startup env injection bypasses system.run allowlist intent (RCE class)
(updated )
system.run environment sanitization allowed shell-startup env overrides (HOME, ZDOTDIR) that can execute attacker-controlled startup files before allowlist-evaluated command bodies.
References
- github.com/advisories/GHSA-xgf2-vxv2-rrmg
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/c2c7114ed39a547ab6276e1e933029b9530ee906
- github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg
- nvd.nist.gov/vuln/detail/CVE-2026-32056
- www.vulncheck.com/advisories/openclaw-remote-code-execution-via-shell-startup-environment-variable-injection-in-system-run
Code Behaviors & Features
Detect and mitigate CVE-2026-32056 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →