top of page
perceptive_background_267k.jpg

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths be…

Published:

4 maart 2026 om 23:00:00

Alert date:

5 maart 2026 om 23:13:13

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a critical vulnerability in the Gateway component that allows arbitrary code execution. The vulnerability stems from insufficient validation of hook module paths before passing them to dynamic import() function. Attackers with gateway configuration modification access can exploit this to load and execute unintended local modules within the Node.js process. This represents a significant security risk for applications using affected OpenClaw versions. Multiple patches and security advisories have been released to address this issue.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page