Impact
OpenClaw versions earlier than 2026.3.31 contain a fail‑open flaw in the plugin installation workflow. When a security scan flags a plugin, the system allows the installation to proceed if the operator chooses to override the warning. This bypass lets an attacker install malicious or untrusted plugins that could execute arbitrary code or compromise the application. The vulnerability is categorized as CWE‑636, reflecting an improper restriction on operations that depend on status indicators.
Affected Systems
The affected product is OpenClaw, specifically any instance running a version earlier than 2026.3.31. The vulnerability is triggered during the plugin installation process in the OpenClaw application, accessible to users with permission to add plugins. No specific sub‑products or modules are listed beyond the core OpenClaw platform; the issue is present in the base product as indicated by its CPE string.
Risk and Exploitability
The CVSS base score of 5.1 classifies this as a moderate‑severity issue. EPSS data are unavailable, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the ability to initiate a plugin installation or to persuade an operator to bypass a security warning, making it more likely to be used in a targeted attack or by an insider with local access. Because the flaw fails a security check rather than providing an arbitrary code path, the risk is limited to the execution of the installed plugin, which could lead to privilege escalation or data compromise within the OpenClaw environment.
OpenCVE Enrichment