{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-44115/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":8.8,"id":"CVE-2026-44115"}],"_cs_exploited":false,"_cs_products":["OpenClaw"],"_cs_severities":["high"],"_cs_tags":["cve-2026-44115","shell-expansion","heredoc","allowlist-bypass","incomplete-list-of-disallowed-inputs"],"_cs_type":"advisory","_cs_vendors":["VulnCheck"],"content_html":"\u003cp\u003eOpenClaw before version 2026.4.22 contains an exec allowlist analysis vulnerability that allows for shell expansion within unquoted heredoc bodies. This vulnerability, identified as CVE-2026-44115, enables attackers to bypass the intended allowlist restrictions by embedding shell expansion tokens directly into the heredoc content. When OpenClaw processes these heredocs, the embedded tokens are expanded, leading to the execution of commands that would otherwise be blocked by the allowlist. This vulnerability was reported by VulnCheck and addressed in version 2026.4.22. Successful exploitation allows an attacker with low privileges to execute arbitrary commands on the system.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAttacker crafts a malicious input containing an unquoted heredoc.\u003c/li\u003e\n\u003cli\u003eThe heredoc body includes shell expansion tokens (e.g., \u003ccode\u003e${IFS}\u003c/code\u003e).\u003c/li\u003e\n\u003cli\u003eThe attacker submits the malicious input to OpenClaw.\u003c/li\u003e\n\u003cli\u003eOpenClaw processes the input and passes it to the vulnerable heredoc parsing logic.\u003c/li\u003e\n\u003cli\u003eThe shell expansion tokens within the heredoc body are expanded before allowlist validation.\u003c/li\u003e\n\u003cli\u003eThe expanded command is executed, bypassing the intended restrictions.\u003c/li\u003e\n\u003cli\u003eAttacker achieves arbitrary command execution on the system.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability allows attackers to execute commands that should be blocked by the configured allowlist. This can lead to a variety of negative outcomes, including unauthorized access to sensitive data, modification of system configurations, or even complete system compromise. The severity is high due to the relative ease of exploitation (low privileges required) and the potential for significant impact on the affected system.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade OpenClaw to version 2026.4.22 or later to remediate CVE-2026-44115.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003eDetect Suspicious Heredoc Usage\u003c/code\u003e to identify potential exploitation attempts.\u003c/li\u003e\n\u003cli\u003eMonitor webserver logs for suspicious activity related to OpenClaw, and review any unusual commands being executed on the system.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-06T20:16:35Z","date_published":"2026-05-06T20:16:35Z","id":"/briefs/2026-05-openclaw-heredoc-bypass/","summary":"OpenClaw before 2026.4.22 is vulnerable to shell expansion in unquoted heredoc bodies, allowing attackers to bypass exec allowlist validation and execute unauthorized commands.","title":"OpenClaw Heredoc Shell Expansion Bypass (CVE-2026-44115)","url":"https://feed.craftedsignal.io/briefs/2026-05-openclaw-heredoc-bypass/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-44115","version":"https://jsonfeed.org/version/1.1"}