Impact
The vulnerability is an archive extraction flaw in the tar.bz2 installer path of OpenClaw prior to version 2026.3.2. It bypasses safety checks that other archive formats enforce, allowing attackers to craft malicious tar.bz2 skill archives that remove special‑entry blocking and extraction‑size guardrails. The result is a local denial of service when the skill is installed, compromising the availability of the system or application that hosts OpenClaw.
Affected Systems
All installations of OpenClaw running versions earlier than 2026.3.2 are affected. The flaw exists in the OpenClaw installer component that handles skill packages delivered as tar.bz2 archives.
Risk and Exploitability
The CVSS score of 6.7 indicates a moderate severity. Exploitability is limited to environments where an attacker can initiate a skill installation, such as a local attacker or an attacker who gains upload rights to the skill store. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local skill installation with a crafted archive, leading to a denial of service.
OpenCVE Enrichment