CVE-2026-28393 Overview
CVE-2026-28393 is a path traversal vulnerability affecting OpenClaw versions 2.0.0-beta3 prior to 2026.2.14. The vulnerability exists in the hook transform module loading functionality, where the hooks.mappings[].transform.module parameter accepts absolute paths and directory traversal sequences without proper validation. This flaw enables attackers who have configuration write access to load and execute arbitrary JavaScript modules with the privileges of the gateway process.
Critical Impact
Attackers with configuration write access can achieve arbitrary JavaScript code execution with gateway process privileges, potentially leading to full system compromise.
Affected Products
- OpenClaw versions 2.0.0-beta3 through versions prior to 2026.2.14
Discovery Timeline
- 2026-03-05 - CVE-2026-28393 published to NVD
- 2026-03-05 - Last updated in NVD database
Technical Details for CVE-2026-28393
Vulnerability Analysis
This vulnerability is classified as CWE-427 (Uncontrolled Search Path Element), manifesting specifically as a path traversal weakness in OpenClaw's hook transform module loading mechanism. The core issue lies in the application's failure to properly sanitize or validate file paths provided through configuration parameters.
When OpenClaw processes hook mappings, it dynamically loads JavaScript modules specified in the transform.module configuration field. The vulnerable code path does not enforce restrictions on the module path, allowing sequences such as ../ or absolute paths like /etc/malicious/payload.js to be specified. This bypasses intended security boundaries and permits loading of arbitrary JavaScript files from any location accessible to the gateway process.
The local attack vector requires the attacker to first obtain configuration write access to the OpenClaw instance. Once achieved, the attacker can modify the hook configuration to point to a malicious module, which will then be loaded and executed during normal gateway operation with full process privileges.
Root Cause
The root cause of CVE-2026-28393 is insufficient path validation in the module loading logic within OpenClaw's hook transform functionality. The application fails to normalize and validate the transform.module path parameter, allowing directory traversal sequences and absolute paths to escape the intended module directory. This represents a failure to implement proper input validation for security-sensitive file system operations.
Attack Vector
Exploitation of this vulnerability requires local access with the ability to modify OpenClaw configuration files. An attacker would follow this general approach:
- Gain write access to the OpenClaw configuration (through compromised credentials, misconfigured permissions, or another vulnerability)
- Place a malicious JavaScript module on the file system accessible to the gateway process
- Modify the hooks.mappings[].transform.module parameter to point to the malicious module using path traversal (e.g., ../../../tmp/malicious.js) or an absolute path
- Wait for or trigger the gateway to reload configuration and execute the malicious module
The malicious JavaScript code executes with the same privileges as the OpenClaw gateway process, potentially enabling lateral movement, data exfiltration, or further system compromise.
Detection Methods for CVE-2026-28393
Indicators of Compromise
- Unusual path patterns in OpenClaw hook configuration files containing ../ sequences or absolute paths outside expected directories
- Configuration changes to hooks.mappings[].transform.module parameters pointing to non-standard locations
- Unexpected JavaScript files appearing in temporary directories or world-writable locations
- Gateway process accessing files outside the normal OpenClaw installation directory
Detection Strategies
- Monitor OpenClaw configuration files for unauthorized modifications, particularly changes to hook transform module paths
- Implement file integrity monitoring on OpenClaw configuration directories
- Analyze gateway process file access patterns for reads from unexpected filesystem locations
- Review access logs for configuration management interfaces for suspicious activity
Monitoring Recommendations
- Enable detailed logging for OpenClaw configuration changes and module loading events
- Set up alerts for configuration file modifications outside of scheduled maintenance windows
- Monitor the gateway process for spawning of unexpected child processes or network connections
- Implement real-time configuration drift detection for production OpenClaw deployments
How to Mitigate CVE-2026-28393
Immediate Actions Required
- Upgrade OpenClaw to version 2026.2.14 or later immediately
- Audit existing OpenClaw configurations for suspicious transform.module paths containing traversal sequences or absolute paths
- Restrict write access to OpenClaw configuration files to only essential administrators
- Review recent configuration changes for signs of unauthorized modification
Patch Information
The OpenClaw maintainers have addressed this vulnerability in version 2026.2.14. The fix implements proper path validation to prevent traversal sequences and restricts module loading to approved directories. Security patches are available through the official repository:
For detailed vulnerability information, refer to the GitHub Security Advisory and the Vulncheck Advisory.
Workarounds
- Implement strict file system permissions to prevent the gateway process from reading files outside designated module directories
- Use application-level firewalling or sandboxing to restrict the gateway process's filesystem access
- Deploy configuration management tools to detect and revert unauthorized configuration changes
- Consider running OpenClaw in a containerized environment with restricted filesystem mounts until patching is complete
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

