icon

We found results for “

CVE-2026-25593

Good to know:

icon
icon

Date: February 5, 2026

Summary An unauthenticated local client could use the Gateway WebSocket API to write config via "config.apply" and set unsafe "cliPath" values that were later used for command discovery, enabling command injection as the gateway user. Impact A local process on the same machine could execute arbitrary commands as the gateway process user. Details - "config.apply" accepted raw JSON and wrote it to disk after schema validation. - "cliPath" values were not constrained to safe executable names/paths. - Command discovery used a shell invocation when resolving executables. Mitigation Upgrade to a patched release. If projects cannot upgrade immediately, set "gateway.auth" and avoid custom "cliPath" values.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Input Validation

CWE-20

Missing Authentication for Critical Function

CWE-306

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-78

Top Fix

icon

Upgrade Version

Upgrade to version clawdbot - 2026.1.20

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us