Description
OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges.
Problem types
Uncontrolled Search Path Element
Product status
2.0.0-beta3 (custom) before 2026.2.14
Credits
AM (@akhmittra)
References
github.com/...enclaw/security/advisories/GHSA-7xhj-55q9-pc3m (GitHub Security Advisory (GHSA-7xhj-55q9-pc3m))
github.com/...ommit/a0361b8ba959e8506dc79d638b6e6a00d12887e4 (Patch Commit #1)
github.com/...ommit/18e8bd68c5015a894f999c6d5e6e32468965bfb5 (Patch Commit #2)
www.vulncheck.com/...ading-via-hook-transform-path-traversal (VulnCheck Advisory: OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal)