Impact
OpenClaw versions earlier than 2026.3.24 expose an arbitrary code execution flaw during local plugin or hook installation. A compromised attacker can create a crafted .npmrc file that overrides the git executable. When npm install runs in the staged package directory, the overridden git command is invoked, allowing the execution of arbitrary programs specified by the attacker. This flaw satisfies CWE‑349 and permits the attacker to gain full code‑execution privileges on the system running OpenClaw, potentially compromising confidential data, altering system integrity, and disrupting availability.
Affected Systems
The vulnerability affects the OpenClaw application. All installations of OpenClaw running a version prior to 2026.3.24 are susceptible. Users on any platform supported by the software that perform local plugin or hook installation are at risk.
Risk and Exploitability
The flaw carries a CVSS score of 8.4, indicating high severity. No EPSS score is available and the issue is not listed in CISA's KEV catalog. Attackers can exploit the vulnerability by creating a malicious .npmrc file during plugin installation, which can be achieved locally if the user is privileged or, in some scenarios, remotely if an attacker can influence the installation process. The lack of requirement for elevated privileges lowers the barrier to exploitation. Given the high impact and the relatively straightforward exploitation path, the risk to organizations using affected OpenClaw versions is significant.
OpenCVE Enrichment
Github GHSA