CVE-2026-27008
📋 TL;DR
OpenClaw versions before 2026.2.15 contain a path traversal vulnerability in the skill installation process. The bug allows malicious skill packages to write files outside the intended sandbox directory during admin-only skill installation. This affects OpenClaw instances where administrators install third-party skills.
💻 Affected Systems
- OpenClaw
📦 What is this software?
Openclaw by Openclaw
⚠️ Risk & Real-World Impact
Worst Case
An attacker could achieve arbitrary file write as the OpenClaw process user, potentially leading to remote code execution, data corruption, or system compromise.
Likely Case
Malicious skill packages could overwrite configuration files, install backdoors, or exfiltrate sensitive data from the OpenClaw instance.
If Mitigated
With proper skill source validation and admin privilege restrictions, impact is limited to the OpenClaw application's data and configuration.
🎯 Exploit Status
Exploitation requires admin access to install skills, making it a supply chain attack vector.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2026.2.15
Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-h7f7-89mm-pqh6
Restart Required: Yes
Instructions:
1. Backup OpenClaw configuration and data. 2. Stop OpenClaw service. 3. Update to version 2026.2.15 using your package manager or from GitHub releases. 4. Restart OpenClaw service. 5. Verify the fix by checking the version.
🔧 Temporary Workarounds
Restrict skill installation sources
allOnly install skills from trusted, verified sources and repositories.
Implement skill validation
allAdd manual review of skill frontmatter before installation.
🧯 If You Can't Patch
- Disable skill installation functionality entirely
- Implement strict network controls to prevent external skill downloads
🔍 How to Verify
Check if Vulnerable:
Check if OpenClaw version is earlier than 2026.2.15 and if skills.install endpoint is accessible to admin users.
Check Version:
openclaw --version or check OpenClaw web interface version info
Verify Fix Applied:
Confirm OpenClaw version is 2026.2.15 or later and test skill installation with a safe test package.
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations outside skill directories
- Skill installation attempts with unusual targetDir paths
Network Indicators:
- Downloads of skill packages from untrusted sources
SIEM Query:
source="openclaw.log" AND ("skills.install" OR "targetDir") AND path NOT CONTAINS "/skills/"
🔗 References
- https://github.com/openclaw/openclaw/commit/2363e1b0853a028e47f90dcc1066e3e9809d65f1
- https://github.com/openclaw/openclaw/commit/b6305e97256d67e439719faacf5af3de9727d6e1
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.15
- https://github.com/openclaw/openclaw/security/advisories/GHSA-h7f7-89mm-pqh6