CVE-2026-28393

7.7 HIGH

📋 TL;DR

OpenClaw versions 2.0.0-beta3 through 2026.2.13 contain a path traversal vulnerability in the hook transform module loading mechanism. Attackers with configuration write access can exploit this to load and execute arbitrary JavaScript modules with gateway process privileges. This affects systems running vulnerable OpenClaw versions where attackers can modify configuration files.

💻 Affected Systems

Products:
  • OpenClaw
Versions: 2.0.0-beta3 through 2026.2.13
Operating Systems: All platforms running OpenClaw
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have write access to OpenClaw configuration files. The vulnerability exists in the default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary code execution with gateway process privileges, potentially leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive data and system resources controlled by the gateway process.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized configuration modifications and network segmentation isolates vulnerable systems.

🌐 Internet-Facing: MEDIUM - Requires configuration write access which may be obtained through other vulnerabilities or misconfigurations.
🏢 Internal Only: HIGH - Internal attackers with configuration access can exploit this for privilege escalation and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires write access to configuration files. The vulnerability is straightforward to exploit once configuration access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.14

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-7xhj-55q9-pc3m

Restart Required: Yes

Instructions:

1. Update OpenClaw to version 2026.2.14 or later. 2. Apply the patches from GitHub commits 18e8bd68c5015a894f999c6d5e6e32468965bfb5 and a0361b8ba959e8506dc79d638b6e6a00d12887e4. 3. Restart the OpenClaw service.

🔧 Temporary Workarounds

Restrict Configuration File Permissions

linux

Limit write access to OpenClaw configuration files to only trusted administrators.

chmod 640 /path/to/openclaw/config/*
chown root:openclaw /path/to/openclaw/config/*

Disable Hook Transform Module Loading

all

Remove or disable hook transform functionality if not required.

# Edit config to remove hooks.mappings[].transform.module entries

🧯 If You Can't Patch

  • Implement strict access controls on OpenClaw configuration files to prevent unauthorized modifications.
  • Network segment OpenClaw instances and monitor for suspicious configuration changes.

🔍 How to Verify

Check if Vulnerable:

Check OpenClaw version: if between 2.0.0-beta3 and 2026.2.13 inclusive, system is vulnerable.

Check Version:

openclaw --version

Verify Fix Applied:

Verify OpenClaw version is 2026.2.14 or later and confirm patches from referenced commits are applied.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized modifications to OpenClaw configuration files
  • Suspicious module loading attempts in OpenClaw logs
  • Errors related to hook transform module paths

Network Indicators:

  • Unusual outbound connections from OpenClaw gateway process
  • Suspicious file transfers from OpenClaw host

SIEM Query:

source="openclaw.log" AND ("transform.module" OR "hooks.mappings") AND (".." OR "/" OR absolute path patterns)

🔗 References

📤 Share & Export