GHSA-xrgv-34cc-q765: Duplicate Advisory: OpenClaw's system.run allowlist bypass via shell line-continuation command substitution
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-9868-vxmx-w862. This link is maintained to preserve external references.
Original Description
OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run that allows attackers to execute non-allowlisted commands by splitting command substitution using shell line-continuation characters. Attackers can bypass security analysis by injecting $\ followed by a newline and opening parenthesis inside double quotes, causing the shell to fold the line continuation into executable command substitution that circumvents approval boundaries.
References
- github.com/advisories/GHSA-xrgv-34cc-q765
- github.com/openclaw/openclaw/commit/3f0b9dbb36c86e308267924c0d3d4a4e1fc4d1e9
- github.com/openclaw/openclaw/security/advisories/GHSA-9868-vxmx-w862
- nvd.nist.gov/vuln/detail/CVE-2026-28460
- www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-shell-line-continuation-command-substitution-in-system-run
Code Behaviors & Features
Detect and mitigate GHSA-xrgv-34cc-q765 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →