CVE-2026-32010
Summary
This issue applies to a non-default configuration only.
If sort is manually added to tools.exec.safeBins, OpenClaw could treat sort --compress-program=<prog> as valid safe-bin usage.
In security=allowlist + ask=on-miss, this could satisfy allowlist checks and skip operator approval, while GNU sort may invoke an external program via --compress-program.
Affected Packages / Versions
- Ecosystem: npm
- Package:
openclaw - Affected:
<= 2026.2.21-2 - Patched (planned next release):
>= 2026.2.22
Default Installations
Default installs are not impacted by this specific path because sort is not included in default tools.exec.safeBins.
Impact
- Type: approval/allowlist bypass in optional safe-bin configuration
- Scope: deployments that explicitly include
sortintools.exec.safeBinsand useallowlist + ask=on-miss - Consequence: an external program may run under the OpenClaw process context without expected approval
Technical Details
sortsafe-bin profile allowed--compress-programas a value flag.- Safe-bin satisfaction could therefore mark allowlist checks as satisfied.
- In
ask=on-miss, satisfied allowlist checks skip approval prompts.
Fix
- Block
--compress-programin safe-bin sort policy. - Add unit and e2e regression coverage for
sort --compress-programdenial in safe-bin mode.
Fix Commit(s)
57fbbaebca4d34d17549accf6092ae26eb7b605c
OpenClaw thanks @tdjackey for reporting.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/openclaw/openclaw/security/advisories/GHSA-4gc7-qcvf-38wg, https://nvd.nist.gov/vuln/detail/CVE-2026-32010, https://github.com/openclaw/openclaw/commit/57fbbaebca4d34d17549accf6092ae26eb7b605c, https://github.com/openclaw/openclaw, https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-sort-compress-program-parameter
