/ data / vuln_en / openclaw / CVE-2026-32917.yaml
CVE-2026-32917.yaml
 1  info:
 2    name: OpenClaw
 3    cve: CVE-2026-32917
 4    summary: OpenClaw < 2026.3.13 - Remote Command Injection via Unsanitized iMessage Attachment Paths in SCP
 5    details: >-
 6      OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage
 7      attachment staging flow. When remote attachment staging is enabled, unsanitized remote
 8      attachment paths containing shell metacharacters (e.g., backticks, semicolons, pipes) are
 9      passed directly to the SCP remote operand without validation, enabling arbitrary command
10      execution on configured remote hosts. A remote attacker can exploit this by sending a crafted
11      iMessage attachment with a malicious filename to the victim's OpenClaw instance.
12      CVSS 4.0 vector: AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N (AT:P indicates
13      the remote attachment staging feature must be enabled). No public PoC or nuclei template
14      found at time of analysis. Patch commit is publicly available.
15    cvss: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
16    severity: CRITICAL
17    security_advise: >-
18      Upgrade OpenClaw to version 2026.3.13 or later. If immediate upgrade is not possible,
19      disable remote attachment staging as a temporary mitigation. Review and sanitize all
20      external input passed to shell commands, especially filenames from messaging channels.
21    references:
22      - https://nvd.nist.gov/vuln/detail/CVE-2026-32917
23      - https://github.com/openclaw/openclaw/security/advisories/GHSA-g2f6-pwvx-r275
24      - https://github.com/openclaw/openclaw/commit/a54bf71b4c0cbe554a84340b773df37ee8e959de
25      - https://www.vulncheck.com/advisories/openclaw-remote-command-injection-via-unsanitized-imessage-attachment-paths-in-scp
26  rule: 'version < "2026.3.13"'
27  references:
28    - https://nvd.nist.gov/vuln/detail/CVE-2026-32917
29    - https://github.com/openclaw/openclaw/security/advisories/GHSA-g2f6-pwvx-r275