Description
OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript under the current user account by placing a malicious extensions/<plugin>/setup-api.js file in a repository and convincing a user to run OpenClaw commands from that directory.
Published: 2026-05-11
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw versions earlier than 2026.4.23 allow an attacker to cause the program to execute arbitrary JavaScript code by placing a crafted extensions/<plugin>/setup-api.js file in a repository and then running OpenClaw commands from that directory. During provider setup metadata resolution the bundled plugin resolver loads setup-api.js from the current working directory without validation, giving the code full access to the user’s runtime environment. The consequence is that any user who runs OpenClaw in a directory containing a malicious setup file will unknowingly execute attacker code under their own user account, potentially compromising confidentiality, integrity, or availability of the local system.

Affected Systems

The CVE affects the OpenClaw product from the OpenClaw vendor. All installations of OpenClaw that use a version older than 2026.4.23 are vulnerable. The vulnerability is tied to the Node.js runtime that OpenClaw bundles, and it applies to every environment where OpenClaw uses that bundled runtime.

Risk and Exploitability

The CVSS v3.1 score is 8.4, indicating a high severity risk. EPSS is not available, so a specific exploitation probability cannot be quantified, and the vulnerability is not listed in the CISA KEV catalog. The likely attack path requires an attacker to supply a malicious repository and persuade a user to execute OpenClaw commands from that directory. Once executed, the attacker can run arbitrary JavaScript and therefore take full control of the executing user’s session. If a user is running commands as a privileged account, the impact escalates to system‑wide compromise.

Generated by OpenCVE AI on May 11, 2026 at 19:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.23 or later to eliminate the vulnerable resolver.
  • Avoid running OpenClaw commands from directories that may contain untrusted extensions; execute commands only from trusted locations.
  • If a patch cannot be applied immediately, remove any setup-api.js files from extensions/<plugin> directories before running OpenClaw or configure the environment to restrict plugin load paths to a safe directory.

Generated by OpenCVE AI on May 11, 2026 at 19:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript under the current user account by placing a malicious extensions/<plugin>/setup-api.js file in a repository and convincing a user to run OpenClaw commands from that directory.
Title OpenClaw < 2026.4.23 - Arbitrary Code Execution via setup-api.js in Current Working Directory
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-427
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-11T18:30:23.933Z

Reserved: 2026-05-08T16:43:53.068Z

Link: CVE-2026-45004

cve-icon Vulnrichment

Updated: 2026-05-11T18:30:19.569Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-11T18:16:40.673

Modified: 2026-05-12T14:20:56.547

Link: CVE-2026-45004

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T19:15:42Z

Weaknesses