CVE-2026-32920

OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verification, allowing arbitrary code execution. Attackers can execute malicious code by including crafted workspace plugins in cloned repositories that execute when users run OpenClaw from the directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

02 Apr 2026, 14:54

Type Values Removed Values Added
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-99qw-6mr3-36qr - () https://github.com/openclaw/openclaw/security/advisories/GHSA-99qw-6mr3-36qr - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-auto-discovery-of-workspace-plugins - () https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-auto-discovery-of-workspace-plugins - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

31 Mar 2026, 18:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.4

31 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 12:16

Updated : 2026-04-02 14:54


NVD link : CVE-2026-32920

Mitre link : CVE-2026-32920

CVE.ORG link : CVE-2026-32920


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere