{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/imessage/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":9.8,"id":"CVE-2026-32917"}],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["command-injection","imessage","openclaw"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eOpenClaw, a software application whose specific function is not detailed in the provided context, is vulnerable to a remote command injection flaw. Specifically, versions prior to 2026.3.13 are susceptible. This vulnerability, identified as CVE-2026-32917, resides within the iMessage attachment staging process.  Attackers can exploit this flaw by injecting shell metacharacters into unsanitized remote attachment paths. This occurs because these paths are directly passed to the SCP command…\u003c/p\u003e\n","date_modified":"2026-03-31T12:16:28Z","date_published":"2026-03-31T12:16:28Z","id":"/briefs/2026-03-openclaw-rce/","summary":"OpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.","title":"OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)","url":"https://feed.craftedsignal.io/briefs/2026-03-openclaw-rce/"}],"language":"en","title":"CraftedSignal Threat Feed — Imessage","version":"https://jsonfeed.org/version/1.1"}