Description
OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges.
References (4)
Core 4
Core References
Vendor Advisory vendor-advisory
https://github.com/openclaw/openclaw/security/advisories/GHSA-7xhj-55q9-pc3m
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/openclaw-beta-arbitrary-javascript-module-loading-via-hook-transform-path-traversal
Scores
CVSS v3
7.7
EPSS
0.0011
EPSS Percentile
28.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-22
Status
published
Products (3)
npm/openclaw
2.0.0-beta3 - 2026.2.14npm
openclaw/openclaw
2.0.0 beta3 (3 CPE variants)
openclaw/openclaw
2026.1.4 - 2026.2.14
Published
Mar 05, 2026
Tracked Since
Mar 06, 2026