Impact
OpenClaw versions prior to 2026.2.14 have a path traversal flaw in the hook transform module loader that lets an attacker provide an absolute path or traversal string via the hooks.mappings[].transform.module parameter, causing the gateway process to import and execute arbitrary JavaScript code. This results in the execution of attacker‑supplied code with gateway‑level privileges, compromising confidentiality, integrity, and availability of the system.
Affected Systems
The vulnerability affects the OpenClaw product, specifically all beta releases of version 2.0.0 (beta3, beta4, beta5) before the 2026.2.14 patch. The affected builds are listed in the CPE data as OpenClaw 2.0.0-beta3 through beta5 on a Node.js environment.
Risk and Exploitability
The CVSS score is 8.3, indicating high severity, while the EPSS score is below 1%, suggesting a low probability of exploitation. The vulnerability is not in the CISA KEV catalog. The attack does not require remote network access; it is inferred that an attacker needs configuration write access or a pathway to modify the hooks.mappings[].transform.module value, which could arise from local privilege or misconfigured system access. Once the attacker supplies a crafted module path, the gateway process will load and execute it, achieving remote code execution on the host.
OpenCVE Enrichment
Github GHSA