Impact
OpenClaw before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers who have access to mirror mode can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks, potentially allowing full system compromise.
Affected Systems
The vulnerability affects OpenClaw OpenClaw versions prior to 2026.3.28.
Risk and Exploitability
The CVSS score is 5.4, indicating moderate severity, while the EPSS score of less than 1% suggests a very low probability of exploitation. The CVE is not listed in the CISA KEV catalog. Attackers need mirror mode access—likely requiring privileged or trusted user status—to exploit the flaw, after which arbitrary code runs on startup.
OpenCVE Enrichment
Github GHSA