<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>VulnCheck — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/vulncheck/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 20:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/vulncheck/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Heredoc Shell Expansion Bypass (CVE-2026-44115)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-heredoc-bypass/</link><pubDate>Wed, 06 May 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-heredoc-bypass/</guid><description>OpenClaw before 2026.4.22 is vulnerable to shell expansion in unquoted heredoc bodies, allowing attackers to bypass exec allowlist validation and execute unauthorized commands.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.4.22 contains an exec allowlist analysis vulnerability that allows for shell expansion within unquoted heredoc bodies. This vulnerability, identified as CVE-2026-44115, enables attackers to bypass the intended allowlist restrictions by embedding shell expansion tokens directly into the heredoc content. When OpenClaw processes these heredocs, the embedded tokens are expanded, leading to the execution of commands that would otherwise be blocked by the allowlist. This vulnerability was reported by VulnCheck and addressed in version 2026.4.22. Successful exploitation allows an attacker with low privileges to execute arbitrary commands on the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious input containing an unquoted heredoc.</li>
<li>The heredoc body includes shell expansion tokens (e.g., <code>${IFS}</code>).</li>
<li>The attacker submits the malicious input to OpenClaw.</li>
<li>OpenClaw processes the input and passes it to the vulnerable heredoc parsing logic.</li>
<li>The shell expansion tokens within the heredoc body are expanded before allowlist validation.</li>
<li>The expanded command is executed, bypassing the intended restrictions.</li>
<li>Attacker achieves arbitrary command execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute commands that should be blocked by the configured allowlist. This can lead to a variety of negative outcomes, including unauthorized access to sensitive data, modification of system configurations, or even complete system compromise. The severity is high due to the relative ease of exploitation (low privileges required) and the potential for significant impact on the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.22 or later to remediate CVE-2026-44115.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Heredoc Usage</code> to identify potential exploitation attempts.</li>
<li>Monitor webserver logs for suspicious activity related to OpenClaw, and review any unusual commands being executed on the system.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-44115</category><category>shell-expansion</category><category>heredoc</category><category>allowlist-bypass</category><category>incomplete-list-of-disallowed-inputs</category></item></channel></rss>