Impact
OpenClaw versions prior to 2026.4.8 do not verify the integrity of downloaded plugin archives, allowing attackers to inject malicious or tampered packages. This flaw enables the execution of arbitrary code within the local assistant environment, compromising confidentiality, integrity, and availability. The weakness is categorized as CWE-353, missing integrity verification.
Affected Systems
All installations of OpenClaw with a version earlier than 2026.4.8 are affected. The vulnerability pertains specifically to the OpenClaw product bundled with Node.js runtime.
Risk and Exploitability
The vulnerability has a CVSS score of 7.5, indicating a high severity. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog. Attackers could exploit this flaw by delivering a rogue plugin archive to a user or system that auto‑installs plugins, or by modifying existing archives. Successful exploitation would allow local code execution and full compromise of the affected environment.
OpenCVE Enrichment