CVE-2026-28447: OpenClaw has a Path Traversal in Plugin Installation
(updated )
OpenClaw’s plugin installation path derivation could be abused by a malicious plugin package.json name to escape the intended extensions directory and write files to a parent directory.
References
- github.com/advisories/GHSA-qrq5-wjgg-rvqw
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/d03eca8450dc493b198a88b105fd180895238e5
- github.com/openclaw/openclaw/commit/d03eca8450dc493b198a88b105fd180895238e57
- github.com/openclaw/openclaw/releases/tag/v2026.2.1
- github.com/openclaw/openclaw/security/advisories/GHSA-qrq5-wjgg-rvqw
- nvd.nist.gov/vuln/detail/CVE-2026-28447
- www.vulncheck.com/advisories/openclaw-beta-path-traversal-in-plugin-installation-via-package-name
Code Behaviors & Features
Detect and mitigate CVE-2026-28447 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →