CVE-2026-41295.yaml
1 info: 2 name: OpenClaw 3 cve: CVE-2026-41295 4 summary: OpenClaw before 2026.4.2 allows untrusted workspace channel shadow code execution during built-in channel setup 5 details: OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability allowing untrusted workspace channel 6 shadows to execute during built-in channel setup and login. Attackers can clone a workspace with a malicious plugin claiming 7 a bundled channel id to achieve unintended in-process code execution before the plugin is explicitly trusted. 8 cvss: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 9 severity: HIGH 10 security_advise: Upgrade OpenClaw to version 2026.4.2 or later. Avoid cloning workspaces from untrusted sources. Review 11 installed plugins and verify they do not claim bundled channel IDs unexpectedly. 12 references: 13 - https://github.com/openclaw/openclaw/commit/53c29df2a9eb242a70d0ff29f3d1e67c8d6801f0 14 - https://github.com/openclaw/openclaw/security/advisories/GHSA-2qrv-rc5x-2g2h 15 - https://www.vulncheck.com/advisories/openclaw-untrusted-workspace-channel-shadow-code-execution-during-built-in-channel-setup 16 rule: version < "2026.4.2" 17 references: 18 - https://github.com/openclaw/openclaw/commit/53c29df2a9eb242a70d0ff29f3d1e67c8d6801f0 19 - https://github.com/openclaw/openclaw/security/advisories/GHSA-2qrv-rc5x-2g2h 20 - https://www.vulncheck.com/advisories/openclaw-untrusted-workspace-channel-shadow-code-execution-during-built-in-channel-setup