OpenClaw versions prior to 2026.2.15 contain an option injection vulnerability in the git-hooks/pre-commit hook that allows attackers to stage ignored files by creating maliciously-named files beginning with dashes. The hook fails to use a -- separator when piping filenames through xargs to git add, enabling attackers to inject git flags and add sensitive ignored files like .env to git history.
Attack Parameters
Attack Vector
Network
Атака возможна удалённо
Attack Complexity
Low
Легко эксплуатировать
Attack Requirements
None
Нет дополнительных условий
Privileges Required
None
Права не нужны
User Interaction
None
Не нужно действие пользователя
Impact Assessment
Confidentiality
High
Полная утечка данных
Integrity
High
Полная модификация данных
Availability
High
Полный отказ в обслуживании
CVSS Vector v4.0
Weakness Type (CWE)
References 4
https://github.com/openclaw/openclaw/commit/b88f37762f5b6d7ec0f589eb761815e466e…
disclosure@vulncheck.com
https://github.com/openclaw/openclaw/commit/ba84b1253967143692166023f9e174c149b…
disclosure@vulncheck.com
https://github.com/openclaw/openclaw/security/advisories/GHSA-mmpf-jwf4-h3qv
disclosure@vulncheck.com
https://www.vulncheck.com/advisories/openclaw-option-injection-in-pre-commit-ho…
disclosure@vulncheck.com