The Lobster extension tool execution path used a Windows shell fallback (shell: true) after spawn failures (EINVAL/ENOENT). In that fallback path, shell metacharacters in command arguments can be interpreted by the shell, enabling command injection.
openclaw (npm)<= 2026.2.172026.2.172026.2.19In affected releases (including v2026.2.17), extensions/lobster/src/lobster-tool.ts retried subprocess launch with shell: true on Windows for EINVAL/ENOENT spawn errors. The fix removes shell fallback and resolves Windows wrappers to explicit executable/script argv execution.
ba7be018da354ea9f803ed356d20464df0437916OpenClaw thanks @allsmog for reporting.
{
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-78"
],
"github_reviewed_at": "2026-03-03T18:09:26Z",
"nvd_published_at": null
}