OpenClaw versions prior to 2026.3.2 contain an archive extraction vulnerability in the tar.bz2 installer path that bypasses safety checks enforced on other archive formats. Attackers can craft malicious tar.bz2 skill archives to bypass special-entry blocking and extracted-size guardrails, causing local denial of service during skill installation.
References
Configurations
History
23 Mar 2026, 17:10
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/0dbb92dd2bcf9a32379d11c0f11ed016669dae3e - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-77hf-7fqf-f227 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-tar-archive-safety-bypass-in-skills-installation - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
21 Mar 2026, 01:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-21 01:17
Updated : 2026-03-23 17:10
NVD link : CVE-2026-32044
Mitre link : CVE-2026-32044
CVE.ORG link : CVE-2026-32044
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-409
Improper Handling of Highly Compressed Data (Data Amplification)
