gitopenclaw.com/threats/cve-2026-24763
Command InjectionCVSS 9.1Patched

CVE-2026-24763

Command Injection via Skill Configuration Parameters

What this means in plain English

If you install a malicious skill, it can sneak shell commands into configuration values and run them directly on your computer — with full access to everything your user account can do. This is one of the most dangerous classes of vulnerability.

Technical description

Improper sanitization of skill configuration parameters allows an attacker to inject arbitrary shell commands that execute with the permissions of the OpenClaw process.

Affected versions

< 0.12.8

Fixed in: 0.12.8

Details

CVE IDCVE-2026-24763
CVSS Score9.1 (CRITICAL)
CategoryCommand Injection
Disclosed2026-01-08
StatusPatched

Are you affected?

1

Run `openclaw --version`

2

Versions below 0.12.8 are affected

3

Check your skill list for recently installed items

How to fix

1

Update immediately: `npm update -g openclaw`

2

Review all installed skills for suspicious configuration

3

Scan each skill at GitOpenClaw before reinstalling

Scan your skills for this vulnerability

Use GitOpenClaw to scan any skill, repo, or install command for patterns associated with CVE-2026-24763 and other known vulnerabilities. Free, no account required.

References

  • https://cisco.com/security/advisories/openclaw-2026-24763

Other OpenClaw CVEs