Critical severity9.8NVD Advisory· Published Mar 31, 2026· Updated Apr 2, 2026
CVE-2026-32917
CVE-2026-32917
Description
OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage attachment staging flow that allows attackers to execute arbitrary commands on configured remote hosts. The vulnerability exists because unsanitized remote attachment paths containing shell metacharacters are passed directly to the SCP remote operand without validation, enabling command execution when remote attachment staging is enabled.
Affected products
1Patches
1a54bf71b4c0chttps://github.com/openclaw/openclawvia nvd-ref
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3- github.com/openclaw/openclaw/commit/a54bf71b4c0cbe554a84340b773df37ee8e959denvdPatch
- github.com/openclaw/openclaw/security/advisories/GHSA-g2f6-pwvx-r275nvdVendor Advisory
- www.vulncheck.com/advisories/openclaw-remote-command-injection-via-unsanitized-imessage-attachment-paths-in-scpnvdThird Party Advisory
News mentions
0No linked articles in our index yet.