CVE-2026-28393

OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
cpe:2.3:a:openclaw:openclaw:2.0.0:beta3:*:*:*:node.js:*:*
cpe:2.3:a:openclaw:openclaw:2.0.0:beta4:*:*:*:node.js:*:*
cpe:2.3:a:openclaw:openclaw:2.0.0:beta5:*:*:*:node.js:*:*

History

No history.

Information

Published : 2026-03-05 22:16

Updated : 2026-03-11 05:17


NVD link : CVE-2026-28393

Mitre link : CVE-2026-28393

CVE.ORG link : CVE-2026-28393


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')