OS Command Injection Vulnerability in OpenClaw Personal AI Assistant
CVE-2026-25157

7.8HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
4 February 2026

What is CVE-2026-25157?

The OpenClaw Personal AI Assistant is susceptible to an OS command injection due to improper handling of user-supplied input in the sshNodeCommand function. Specifically, an attacker can exploit this vulnerability by providing an unescaped project path which, when an error occurs, gets interpolated into an echo statement. Additionally, the parseSSHTarget function lacks validation for SSH target strings that start with a dash, allowing attackers to manipulate SSH configuration flags for arbitrary command execution on affected systems. This vulnerability has been addressed in version 2026.1.29.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

openclaw < 2026.1.29

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.