Home

Description

OpenClaw before 2026.3.31 contains a fail-open vulnerability in the plugin installation flow where security scan failures do not block installation. Attackers can exploit scan failures to install untrusted plugins when operators proceed despite visible scan warnings.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-28 | Updated 2026-04-28 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

MEDIUM: 4.6CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-636: Not Failing Securely (Failing Open)

Product status

Default status
unaffected

Any version before 2026.3.31
affected

2026.3.31 (semver)
unaffected

Credits

davidluzsilva reporter

References

github.com/...enclaw/security/advisories/GHSA-cwq8-6f96-g3q4 (GitHub Security Advisory (GHSA-cwq8-6f96-g3q4)) vendor-advisory

github.com/...ommit/7a953a52271b9188a5fa830739a4366614ff9916 (Patch Commit) patch

github.com/...ommit/44b993613601280d46a5b88190e46669fc13d669 (Patch Commit) patch

github.com/...ommit/0d7f1e2c84eca65df7dee890d9c30e2a841c030a (Patch Commit) patch

github.com/...ommit/bf96c67fd1954740aeabfadc7cfe3098bcfc6b68 (Patch Commit) patch

www.vulncheck.com/...rity-scan-bypass-in-plugin-installation (VulnCheck Advisory: OpenClaw < 2026.3.31 - Fail-Open Security Scan Bypass in Plugin Installation) third-party-advisory

cve.org (CVE-2026-41377)

nvd.nist.gov (CVE-2026-41377)

Download JSON