Impact
A path traversal flaw in the plugin installation routine allows attackers to craft package names that escape the intended extensions directory by using directory traversal characters such as "..". This deficiency lets an attacker write arbitrary files to locations outside the protected plugin folder, which could overwrite critical system files or place malicious plugins. If the installed plugins are subsequently loaded, the attacker can achieve remote code execution or manipulate the application’s behavior. The weakness is classified as CWE-22.
Affected Systems
OpenClaw version 2026.1.29‑beta.1 and earlier than 2026.2.1 are affected. The product, built on the Node.js runtime, does not mitigate the path traversal during plugin installation.
Risk and Exploitability
The vulnerability has a CVSS score of 7, indicating moderate to high severity. According to EPSS, the probability of exploitation is less than 1% and the flaw is not currently listed in CISA’s KEV catalog. Exploitability requires the attacker to supply a malicious plugin package name and trigger the install command, suggesting a local or user‑initiated attack vector. The combination of a moderate severity score, low exploitation likelihood, and absence from KEV points to a significant but not imminent threat if the software remains unpatched.
OpenCVE Enrichment
Github GHSA