Impact
The vulnerability is a path traversal flaw during archive extraction in installation commands. Attackers can create a malicious archive that, when processed by skills install, hooks install, plugins install, or signal install, writes files outside the intended directory. This allows modification of arbitrary files and can enable persistence or remote code execution.
Affected Systems
The affected software is OpenClaw. Versions 2026.1.16-2 up to but not including 2026.2.14 are vulnerable. All installations relying on the listed installation commands fall into scope.
Risk and Exploitability
The CVSS score is 6.8, indicating a moderate severity, while the EPSS score is less than 1%, suggesting low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to supply the crafted archive and trigger an installation command. The attack vector is therefore likely to be within environments where installation commands are executed without strict validation of source archives.
OpenCVE Enrichment
Github GHSA