TopVuln

High-risk vulnerability digests

CVE-2026-32917

  • CRITICAL

Details

CVSS v3
9.8
CVSS v4
9.2
NVD published
2026-03-31 12:16:28
EPSS
0.6% probability · 68.9th percentile — 2026-05-05
Affected versions
OpenClaw before 2026.3.13
Summary
This vulnerability allows unauthenticated attackers to execute arbitrary commands on remote hosts running vulnerable OpenClaw versions. It occurs because unsanitized attachment paths containing shell metacharacters are passed directly to SCP without validation when remote attachment staging is enabled.
Remediation
Upgrade OpenClaw to version 2026.3.13 or later to remediate this vulnerability. If immediate upgrading is not possible, disable remote attachment staging to reduce the risk of exploitation.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.