Cyber Posture

CVE-2026-28393

HighPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0011 28.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute…

more

malicious modules with gateway process privileges.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the path traversal vulnerability by enforcing validation of the hooks.mappings[].transform.module parameter to reject absolute paths and traversal sequences.

prevent

Ensures timely flaw remediation through patching to OpenClaw 2026.2.14 or later, which fixes the improper module path handling.

prevent

Restricts logical access to configuration changes, limiting the ability of attackers to write malicious hooks.mappings[].transform.module values.

Security SummaryAI

OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 are affected by CVE-2026-28393, a path traversal vulnerability (CWE-22) in the hook transform module loading functionality. The vulnerability arises because the hooks.mappings[].transform.module parameter improperly accepts absolute paths and traversal sequences, enabling the loading and execution of arbitrary JavaScript modules. Published on 2026-03-05, it carries a CVSS v3.1 base score of 7.7 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high confidentiality and integrity impacts with no availability disruption.

Attackers with configuration write access can exploit this issue locally with low complexity and no user interaction. By supplying malicious paths in the transform.module parameter, they can load arbitrary JavaScript modules that execute with the privileges of the gateway process, potentially leading to unauthorized access, data manipulation, or further compromise within the OpenClaw environment.

Mitigation involves upgrading to OpenClaw version 2026.2.14 or later, where the vulnerability is addressed. Relevant patches are detailed in GitHub commits 18e8bd68c5015a894f999c6d5e6e32468965bfb5 and a0361b8ba959e8506dc79d638b6e6a00d12887e4. Additional guidance appears in the OpenClaw security advisory GHSA-7xhj-55q9-pc3m and the VulnCheck advisory at https://www.vulncheck.com/advisories/openclaw-beta-arbitrary-javascript-module-loading-via-hook-transform-path-traversal.

Details

CWE(s)

Affected Products

openclaw
openclaw
2.0.0 · 2026.1.4 — 2026.2.14

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Path traversal enables loading and execution of arbitrary JavaScript modules with gateway process privileges, directly facilitating exploitation for privilege escalation (T1068) and JavaScript interpreter abuse (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References