CVE-2026-25157
📋 TL;DR
OpenClaw versions before 2026.1.29 contain two command injection vulnerabilities. Attackers can execute arbitrary commands on remote SSH hosts via unescaped project paths or on local machines via malicious SSH target strings. Users running vulnerable OpenClaw versions are affected.
💻 Affected Systems
- OpenClaw
📦 What is this software?
Openclaw by Openclaw
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of both local and remote systems, allowing data theft, ransomware deployment, or lateral movement across networks.
Likely Case
Remote code execution on SSH hosts leading to data exfiltration, credential harvesting, or backdoor installation.
If Mitigated
Limited impact with proper network segmentation and least privilege SSH configurations.
🎯 Exploit Status
Simple command injection via user-controlled parameters; exploitation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2026.1.29
Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-q284-4pvr-m585
Restart Required: Yes
Instructions:
1. Stop OpenClaw service. 2. Update to version 2026.1.29 via package manager or manual installation. 3. Restart OpenClaw service.
🔧 Temporary Workarounds
Disable SSH functionality
allTemporarily disable OpenClaw's SSH features if not required.
# Edit OpenClaw configuration to remove SSH module references
# Restart OpenClaw after configuration changes
Input validation hardening
allImplement strict input validation for project paths and SSH targets.
# Add validation to reject paths containing shell metacharacters
# Reject SSH targets starting with dashes
🧯 If You Can't Patch
- Network segmentation: Isolate OpenClaw instances from critical systems.
- Least privilege SSH: Configure SSH to use restricted user accounts with minimal permissions.
🔍 How to Verify
Check if Vulnerable:
Check OpenClaw version; if below 2026.1.29, assume vulnerable.
Check Version:
openclaw --version
Verify Fix Applied:
Confirm version is 2026.1.29 or higher and test SSH functionality with malicious inputs.
📡 Detection & Monitoring
Log Indicators:
- Unusual SSH connections from OpenClaw
- Error messages containing suspicious shell commands
- Failed cd commands with unusual paths
Network Indicators:
- SSH connections to unexpected hosts
- Outbound connections following OpenClaw SSH operations
SIEM Query:
source="openclaw.log" AND ("cd failed" OR "ssh -oProxyCommand")