CVE-2026-28486

6.1 MEDIUM

📋 TL;DR

OpenClaw versions 2026.1.16-2 through 2026.2.13 contain a path traversal vulnerability in archive extraction during installation commands. Attackers can craft malicious archives that write files outside intended directories when extracted via install commands, potentially enabling persistence or code execution. Users running vulnerable OpenClaw versions are affected.

💻 Affected Systems

Products:
  • OpenClaw
Versions: 2026.1.16-2 through 2026.2.13
Operating Systems: All platforms running OpenClaw
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects all installation commands: skills install, hooks install, plugins install, and signal install

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment

🟠

Likely Case

Arbitrary file writes enabling persistence mechanisms, configuration modification, or privilege escalation

🟢

If Mitigated

Limited to file writes in user-controlled directories with proper access controls

🌐 Internet-Facing: MEDIUM - Requires user interaction to install malicious archives but could be combined with social engineering
🏢 Internal Only: MEDIUM - Internal users could exploit via malicious archives in shared repositories or build pipelines

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires crafting malicious archive with path traversal sequences

Exploitation requires user to execute install commands on malicious archives

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.14 and later

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-v892-hwpg-jwqp

Restart Required: No

Instructions:

1. Update OpenClaw to version 2026.2.14 or later using package manager. 2. Verify installation with 'openclaw --version'. 3. No restart required as this is a library/application fix.

🔧 Temporary Workarounds

Disable archive installation

all

Temporarily disable installation from archive files until patched

# Configure OpenClaw to reject archive installations
# Check documentation for specific configuration options

Use trusted sources only

all

Restrict installation to verified, signed packages from official repositories

# Configure package sources to official repos only
# Remove untrusted package sources

🧯 If You Can't Patch

  • Implement strict access controls on directories where OpenClaw runs
  • Monitor for suspicious archive extraction patterns and file writes outside expected directories

🔍 How to Verify

Check if Vulnerable:

Check OpenClaw version with 'openclaw --version' and compare to affected range 2026.1.16-2 through 2026.2.13

Check Version:

openclaw --version

Verify Fix Applied:

Verify version is 2026.2.14 or later with 'openclaw --version' and test archive extraction with known safe test files

📡 Detection & Monitoring

Log Indicators:

  • Archive extraction logs showing path traversal sequences
  • File writes outside expected OpenClaw directories
  • Installation commands processing archives with '..' or absolute paths

Network Indicators:

  • Downloads of archives from untrusted sources followed by OpenClaw installation commands

SIEM Query:

process_name:"openclaw" AND (command_line:"install" AND command_line:"archive") AND file_write_path:(".." OR "/" OR absolute_path_patterns)

🔗 References

📤 Share & Export