CVE-2026-28393

HIGH

OpenClaw <2026.2.14 - Path Traversal

Title source: llm
STIX 2.1

Description

OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges.

Scores

CVSS v3 7.7
EPSS 0.0011
EPSS Percentile 28.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-22
Status published
Products (3)
npm/openclaw 2.0.0-beta3 - 2026.2.14npm
openclaw/openclaw 2.0.0 beta3 (3 CPE variants)
openclaw/openclaw 2026.1.4 - 2026.2.14
Published Mar 05, 2026
Tracked Since Mar 06, 2026