CVE-2026-28484 PUBLISHED

OpenClaw 2026.2.15 - Option Injection in pre-commit Hook via Malicious Filenames

Assigner: VulnCheck
Reserved: 27.02.2026 Published: 05.03.2026 Updated: 05.03.2026

OpenClaw versions prior to 2026.2.15 contain an option injection vulnerability in the git-hooks/pre-commit hook that allows attackers to stage ignored files by creating maliciously-named files beginning with dashes. The hook fails to use a -- separator when piping filenames through xargs to git add, enabling attackers to inject git flags and add sensitive ignored files like .env to git history.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.2.15 (excl.)

References

Problem Types

  • Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE