CVE-2026-24763 Overview
OpenClaw (formerly Clawdbot) is a personal AI assistant designed to run on users' own devices. A command injection vulnerability was identified in OpenClaw's Docker sandbox execution mechanism prior to version 2026.1.29. The vulnerability stems from unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user with the ability to control environment variables could exploit this flaw to influence command execution within the container context, potentially leading to unauthorized access, data manipulation, or complete container compromise.
Critical Impact
Authenticated attackers can inject arbitrary commands through manipulated PATH environment variables, potentially achieving code execution within the Docker container context with high impact to confidentiality, integrity, and availability.
Affected Products
- OpenClaw versions prior to 2026.1.29
- OpenClaw Docker sandbox execution module
- Clawdbot (legacy name) installations
Discovery Timeline
- 2026-02-02 - CVE CVE-2026-24763 published to NVD
- 2026-02-03 - Last updated in NVD database
Technical Details for CVE-2026-24763
Vulnerability Analysis
This vulnerability is classified as CWE-78 (Improper Neutralization of Special Elements used in an OS Command), commonly known as command injection. The flaw exists in how OpenClaw constructs and executes shell commands within its Docker sandbox environment. When building shell commands, the application fails to properly sanitize or validate the PATH environment variable, allowing an authenticated user to inject malicious commands through environment variable manipulation.
The network-accessible attack vector means that exploitation can occur remotely, and the low attack complexity indicates that the vulnerability is straightforward to exploit once an attacker has authenticated access. The lack of user interaction requirements makes this particularly dangerous in automated or scripted attack scenarios.
Root Cause
The root cause is improper input validation and sanitization of the PATH environment variable before it is used in constructing shell commands. When OpenClaw's Docker sandbox execution mechanism builds commands to run within the container, it trusts the PATH variable without verifying that it contains only legitimate directory paths. This allows an attacker to inject shell metacharacters or additional commands through a crafted PATH value.
Attack Vector
An authenticated attacker can exploit this vulnerability by manipulating the PATH environment variable to include shell metacharacters or command sequences. When OpenClaw constructs and executes commands within the Docker container, these injected elements are interpreted as part of the command, leading to arbitrary command execution. The attack is network-based and requires only low privileges (authenticated access), with no user interaction needed.
The exploitation flow typically involves:
- Authenticating to the OpenClaw application
- Manipulating the PATH environment variable to include malicious command sequences
- Triggering the Docker sandbox execution mechanism
- The injected commands execute within the container context
For detailed technical analysis, refer to the GitHub Security Advisory GHSA-mc68-q9jw-2h3v.
Detection Methods for CVE-2026-24763
Indicators of Compromise
- Unusual or malformed PATH environment variable values containing shell metacharacters (;, |, &, $(), backticks)
- Unexpected process executions within OpenClaw Docker containers
- Container logs showing commands executed from non-standard paths
- Evidence of environment variable manipulation in application logs
Detection Strategies
- Monitor Docker container logs for unusual command patterns or unexpected process spawning
- Implement runtime security monitoring within containers to detect anomalous shell command execution
- Deploy file integrity monitoring to detect unauthorized changes within container filesystems
- Use behavioral analysis to identify deviations from normal OpenClaw execution patterns
Monitoring Recommendations
- Enable detailed logging for environment variable handling in OpenClaw configurations
- Configure alerts for shell metacharacters appearing in environment variables
- Implement container runtime security solutions to monitor command execution
- Review authentication logs for accounts that may have been used in exploitation attempts
How to Mitigate CVE-2026-24763
Immediate Actions Required
- Upgrade OpenClaw to version 2026.1.29 or later immediately
- Audit authentication logs for any suspicious activity prior to patching
- Review container configurations and restrict environment variable permissions where possible
- Implement network segmentation to limit exposure of OpenClaw instances
Patch Information
The vulnerability has been addressed in OpenClaw version 2026.1.29. The fix implements proper sanitization and validation of the PATH environment variable before it is used in shell command construction. The patch is available through:
Organizations should prioritize this update given the high severity and the potential for container compromise.
Workarounds
- Restrict authenticated user access to only trusted individuals until patching is complete
- Implement strict input validation at the application layer for environment variables
- Use container security policies to limit command execution capabilities
- Deploy network access controls to limit who can reach OpenClaw instances
# Example: Restrict container capabilities while awaiting patch
docker run --cap-drop=ALL --cap-add=CHOWN --cap-add=SETUID --cap-add=SETGID \
--security-opt=no-new-privileges:true \
openclaw/openclaw:latest
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

