Summary
A Windows system.run approval-integrity mismatch in the cmd.exe /c path could allow trailing arguments to execute while approval/audit text reflected only a benign command string.
This requires an authenticated operator context using the approvals flow and a trusted Windows node.
Affected Packages / Versions
- Package:
openclaw (npm)
- Latest published vulnerable version (as of 2026-02-21):
2026.2.19-2
- Vulnerable range:
<=2026.2.19-2
- Patched version (planned next release):
2026.2.21
Attack Scenario
- An authenticated operator approval is created for a benign command text (for example,
echo).
- A
system.run request uses cmd.exe /c with extra trailing arguments.
- Prior behavior could bind approval/audit text to the benign command while still executing the full argument tail on the node.
Impact
- Local command execution on the trusted Windows node process account.
- Approval/audit command text integrity mismatch.
Fix
- Canonicalize the full command tail after
cmd.exe /c.
- Reuse one shared command canonicalization/validation path for validation, approval matching, and execution/audit text.
- Add regression coverage for trailing-argument smuggling and approval binding.
Fix Commit(s)
6007941f04df1edcca679dd6c95949744fdbd4df
Release Process Note
patched_versions is pre-set to the planned next release (2026.2.21). Once that npm release is live, this advisory can be published directly.
OpenClaw thanks @tdjackey for reporting.
References
Summary
A Windows
system.runapproval-integrity mismatch in thecmd.exe /cpath could allow trailing arguments to execute while approval/audit text reflected only a benign command string.This requires an authenticated operator context using the approvals flow and a trusted Windows node.
Affected Packages / Versions
openclaw(npm)2026.2.19-2<=2026.2.19-22026.2.21Attack Scenario
echo).system.runrequest usescmd.exe /cwith extra trailing arguments.Impact
Fix
cmd.exe /c.Fix Commit(s)
6007941f04df1edcca679dd6c95949744fdbd4dfRelease Process Note
patched_versionsis pre-set to the planned next release (2026.2.21). Once that npm release is live, this advisory can be published directly.OpenClaw thanks @tdjackey for reporting.
References