CVE-2026-24763
📋 TL;DR
OpenClaw (formerly Clawdbot) versions prior to 2026.1.29 contain a command injection vulnerability in the Docker sandbox execution mechanism. Authenticated users who can control environment variables can execute arbitrary commands within the container context. This affects all users running vulnerable versions of OpenClaw.
💻 Affected Systems
- OpenClaw (formerly Clawdbot)
⚠️ Risk & Real-World Impact
Worst Case
Full container compromise leading to host escape, data exfiltration, or lateral movement within the environment
Likely Case
Unauthorized command execution within the container, potentially accessing sensitive data or disrupting services
If Mitigated
Limited impact due to container isolation, but still potential for data access within the container
🎯 Exploit Status
Exploitation requires authenticated access and ability to control environment variables
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2026.1.29
Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-mc68-q9jw-2h3v
Restart Required: Yes
Instructions:
1. Stop OpenClaw service
2. Update to version 2026.1.29 or later
3. Restart OpenClaw service
4. Verify the fix is applied
🔧 Temporary Workarounds
Restrict Environment Variable Control
allLimit user ability to control environment variables in OpenClaw configuration
Enhanced Container Isolation
linuxImplement stricter Docker security policies and resource limits
docker run --read-only --security-opt=no-new-privileges
🧯 If You Can't Patch
- Implement strict access controls to limit authenticated user privileges
- Monitor container activity for unusual command execution patterns
🔍 How to Verify
Check if Vulnerable:
Check OpenClaw version - if earlier than 2026.1.29, system is vulnerable
Check Version:
openclaw --version or check package manager
Verify Fix Applied:
Confirm version is 2026.1.29 or later and review commit 771f23d36b95ec2204cc9a0054045f5d8439ea75
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in container logs
- PATH environment variable manipulation attempts
Network Indicators:
- Unexpected outbound connections from OpenClaw container
SIEM Query:
source="docker" AND (process="sh" OR process="bash") AND parent_process="openclaw"