← Zuruck zu CVEs
CVE-2026-28456
HIGH7.2
Beschreibung
OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process.
CVE Details
CVSS v3.1 Bewertung7.2
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht3/5/2026
Zuletzt geandert3/9/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
openclaw:openclaw
Schwachen (CWE)
CWE-427
Referenzen
https://github.com/openclaw/openclaw/commit/35c0e66ed057f1a9f7ad2515fdcef516bd6584ce(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/commit/a0361b8ba959e8506dc79d638b6e6a00d12887e4(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-v6c6-vqqg-w888(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.