CVE-2026-28447

8.1 HIGH

📋 TL;DR

OpenClaw versions 2026.1.29-beta.1 through 2026.2.1 contain a path traversal vulnerability in plugin installation. Attackers can craft malicious plugin package names with path traversal sequences (like '..') to write files outside the intended extensions directory when users run the 'plugins install' command. This affects all users running vulnerable versions of OpenClaw.

💻 Affected Systems

Products:
  • OpenClaw
Versions: 2026.1.29-beta.1 through 2026.2.1
Operating Systems: All platforms running OpenClaw
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the vulnerable plugin installation mechanism are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution by writing malicious files to system directories, potentially leading to full system compromise.

🟠

Likely Case

Arbitrary file write to sensitive locations, enabling data theft, privilege escalation, or denial of service.

🟢

If Mitigated

Limited to plugin installation directories with proper sandboxing, but still allows unauthorized file writes.

🌐 Internet-Facing: MEDIUM - Requires user interaction to install malicious plugins, but could be combined with social engineering.
🏢 Internal Only: MEDIUM - Internal users could exploit this to escalate privileges or compromise systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to run 'plugins install' with a malicious package name. Public proof-of-concept exists in advisory references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.1 and later

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-qrq5-wjgg-rvqw

Restart Required: No

Instructions:

1. Update OpenClaw to version 2026.2.1 or later. 2. Run 'openclaw --update' or use your package manager. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable plugin installation

all

Temporarily disable the plugin installation feature to prevent exploitation.

openclaw config set plugins.install.enabled false

Restrict plugin sources

all

Only install plugins from trusted, verified sources.

🧯 If You Can't Patch

  • Implement strict access controls on the OpenClaw installation directory to prevent unauthorized file writes.
  • Monitor and audit all plugin installation activities for suspicious package names containing path traversal sequences.

🔍 How to Verify

Check if Vulnerable:

Check your OpenClaw version with 'openclaw --version'. If it's between 2026.1.29-beta.1 and 2026.2.1, you are vulnerable.

Check Version:

openclaw --version

Verify Fix Applied:

After updating, run 'openclaw --version' to confirm version is 2026.2.1 or later. Test plugin installation with a safe package.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing plugin installation with package names containing '..' or path traversal sequences
  • Unexpected file writes outside the extensions directory

Network Indicators:

  • Downloads of plugin packages from untrusted sources

SIEM Query:

source="openclaw.log" AND "plugins install" AND (".." OR "../" OR "/..")

🔗 References

📤 Share & Export