CVE-2026-41377
MEDIUMOpenClaw < 2026.3.31 - Fail-Open Security Scan Bypass in Plugin Installation
Title source: cnaDescription
OpenClaw before 2026.3.31 contains a fail-open vulnerability in the plugin installation flow where security scan failures do not block installation. Attackers can exploit scan failures to install untrusted plugins when operators proceed despite visible scan warnings.
References (6)
Core 6
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-cwq8-6f96-g3q4)
https://github.com/openclaw/openclaw/security/advisories/GHSA-cwq8-6f96-g3q4
Patch patch
Patch Commit
https://github.com/openclaw/openclaw/commit/7a953a52271b9188a5fa830739a4366614ff9916
Patch patch
Patch Commit
https://github.com/openclaw/openclaw/commit/44b993613601280d46a5b88190e46669fc13d669
Patch patch
Patch Commit
https://github.com/openclaw/openclaw/commit/0d7f1e2c84eca65df7dee890d9c30e2a841c030a
Patch patch
Patch Commit
https://github.com/openclaw/openclaw/commit/bf96c67fd1954740aeabfadc7cfe3098bcfc6b68
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.3.31 - Fail-Open Security Scan Bypass in Plugin Installation
https://www.vulncheck.com/advisories/openclaw-fail-open-security-scan-bypass-in-plugin-installation
Scores
CVSS v3
4.6
EPSS
0.0003
EPSS Percentile
9.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-636
Status
published
Products (2)
OpenClaw/OpenClaw
< 2026.3.31
OpenClaw/OpenClaw
2026.3.31
Published
Apr 28, 2026
Tracked Since
Apr 29, 2026