Arbitrary Code Execution Vulnerability in OpenShell by OpenClaw
CVE-2026-41355

5.4MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41355?

OpenShell versions before 2026.3.28 are susceptible to an arbitrary code execution vulnerability due to flaws in mirror mode functionality. This vulnerability allows attackers who can access the mirror mode to exploit untrusted sandbox files, converting them into workspace hooks. During gateway startup, the execution of arbitrary code on the host system can occur, presenting significant security risks. Users are urged to upgrade to the latest version to mitigate potential threats.

Affected Version(s)

OpenClaw 0 < 2026.3.28

OpenClaw 2026.3.28

References

CVSS V4

Score:
5.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

tdjackey
.