SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP OpenClaw long option abbreviations remote code execution attempt
This rule looks for a request to the OpenClaw API endpoint that includes JSON fields indicating a tool execution command with specific long‑option arguments used to bypass safety checks. Successful exploitation allows an attacker to execute arbitrary system commands on the server.
This rule fires on attempts to exploit a remote code execution vulnerability in OpenClaw web application servers.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
Rule Categories::Server::Web Applications
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Vulnerability::Severity::Critical
Vulnerability::Severity::High
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2026-28363 |
Loading description
|