Description
OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process.
Published: 2026-03-05
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Code Execution
Action: Patch Immediately
AI Analysis

Impact

OpenClaw versions lower than 2026.2.14 contain a flaw in the Gateway that fails to validate configured hook module paths before passing them to dynamic import(). If an attacker can modify the gateway configuration, they can specify a local module path that the Node.js process will load and execute, resulting in full code execution within the application context. The vulnerability directly exploits the improper handling of unvalidated file paths (CWE‑427) and grants the attacker the same privileges as the running process.

Affected Systems

Affected vendors and products include OpenClaw OpenClaw. The issue is present in releases 2026.1.5 through 2026.2.13 inclusive. Any instance of these versions that allows gateway configuration modification—whether through an internal administrative interface or an exposed configuration endpoint—is vulnerable.

Risk and Exploitability

The CVSS score of 8.6 classifies the vulnerability as high severity. Although the EPSS score is less than 1 %, indicating that exploitation is currently rare, the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an attacker who can alter gateway configuration, which may be achieved via privileged internal access or, if a configuration interface is publicly reachable, through a remote attack. An attacker would supply a crafted module path that resolves to an unintended local module; the dynamic import() call then loads that module, allowing the attacker to run arbitrary code with the Node.js process’s privileges.

Generated by OpenCVE AI on April 17, 2026 at 12:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.2.14 or newer to incorporate the fix that validates hook module paths.
  • Restrict access to the gateway configuration interface so that only trusted administrators can modify it, enforcing least‑privilege principles.
  • Implement directory access controls that limit read and execute permissions only to the intended hook modules, mitigating accidental or malicious inclusion of unintended files.

Generated by OpenCVE AI on April 17, 2026 at 12:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v6c6-vqqg-w888 OpenClaw affected by potential code execution via unsafe hook module path handling in Gateway
History

Mon, 09 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process.
Title OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path Handling
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-427
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T17:06:29.689Z

Reserved: 2026-02-27T19:17:39.346Z

Link: CVE-2026-28456

cve-icon Vulnrichment

Updated: 2026-03-09T17:05:40.612Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:18.020

Modified: 2026-03-09T18:01:46.300

Link: CVE-2026-28456

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:45:16Z

Weaknesses