/ data / vuln_en / openclaw / CVE-2026-41295.yaml
CVE-2026-41295.yaml
 1  info:
 2    name: OpenClaw
 3    cve: CVE-2026-41295
 4    summary: OpenClaw before 2026.4.2 allows untrusted workspace channel shadow code execution during built-in channel setup
 5    details: OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability allowing untrusted workspace channel
 6      shadows to execute during built-in channel setup and login. Attackers can clone a workspace with a malicious plugin claiming
 7      a bundled channel id to achieve unintended in-process code execution before the plugin is explicitly trusted.
 8    cvss: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
 9    severity: HIGH
10    security_advise: Upgrade OpenClaw to version 2026.4.2 or later. Avoid cloning workspaces from untrusted sources. Review
11      installed plugins and verify they do not claim bundled channel IDs unexpectedly.
12    references:
13    - https://github.com/openclaw/openclaw/commit/53c29df2a9eb242a70d0ff29f3d1e67c8d6801f0
14    - https://github.com/openclaw/openclaw/security/advisories/GHSA-2qrv-rc5x-2g2h
15    - https://www.vulncheck.com/advisories/openclaw-untrusted-workspace-channel-shadow-code-execution-during-built-in-channel-setup
16  rule: version < "2026.4.2"
17  references:
18  - https://github.com/openclaw/openclaw/commit/53c29df2a9eb242a70d0ff29f3d1e67c8d6801f0
19  - https://github.com/openclaw/openclaw/security/advisories/GHSA-2qrv-rc5x-2g2h
20  - https://www.vulncheck.com/advisories/openclaw-untrusted-workspace-channel-shadow-code-execution-during-built-in-channel-setup