GHSA-CWQ8-6F96-G3Q4: Fail-Open Security Bypass in OpenClaw Plugin Installation
Vulnerability ID: GHSA-CWQ8-6F96-G3Q4
CVSS Score: 8.8
Published: 2026-04-02
OpenClaw versions prior to March 30, 2026, contain a critical fail-open vulnerability in the plugin installation mechanism. The security scanner designed to block dangerous code patterns fails to halt the installation process when encountering internal errors or critical security findings.
TL;DR
A fail-open flaw in OpenClaw allows malicious plugins to bypass security scans and execute arbitrary code by triggering scanner errors or relying on ignored warnings.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-390
- Attack Vector: Local / User-Assisted
- CVSS Score: 8.8 (High)
- Impact: Arbitrary Code Execution
- Exploit Status: Proof of Concept Available
- CISA KEV: Not Listed
Affected Systems
- OpenClaw Plugin Installer
- OpenClaw Skills Runtime
- BuiltinInstallScan Module
-
OpenClaw: < fixed version (March 30, 2026) (Fixed in:
commit 7a953a52)
Code Analysis
Commit: 7a953a5
Enforce fail-closed model for plugin installation scans
function buildBlockedScanResult(params: { builtinScan: BuiltinInstallScan; targetLabel: string; }): InstallSecurityScanResult | undefined { if (params.builtinScan.status === "error") { return { blocked: { code: "security_scan_failed", reason: buildScanFailureBlockReason({ /* ... */ }), }, }; } if (params.builtinScan.critical > 0) { return { blocked: { code: "security_scan_blocked", reason: buildCriticalBlockReason({ /* ... */ }), }, }; } return undefined; }
Mitigation Strategies
- Update OpenClaw to a version released after March 30, 2026
- Run retrospective deep audits on installed plugins
- Monitor application logs for specific scanner failure strings
Remediation Steps:
- Verify the current running version of OpenClaw.
- Pull the latest changes or download the latest release containing commit 7a953a52271b9188a5fa830739a4366614ff9916.
- Restart the OpenClaw service to ensure the new installation logic is loaded into memory.
- Execute the command
openclaw security audit --deepto retroactively identify malicious plugins installed prior to patching. - Uninstall any plugins flagged by the audit command.
References
Read the full report for GHSA-CWQ8-6F96-G3Q4 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)