The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-45004

CVE-2026-45004: Openclaw Openclaw RCE Vulnerability

CVE-2026-45004 is a remote code execution vulnerability in Openclaw Openclaw that allows attackers to execute arbitrary JavaScript by placing malicious setup-api.js files. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: May 18, 2026

CVE-2026-45004 Overview

CVE-2026-45004 is an arbitrary code execution vulnerability in OpenClaw versions prior to 2026.4.23. The flaw resides in the bundled plugin setup resolver, which loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript under the current user account by planting a malicious extensions/<plugin>/setup-api.js file in a repository and convincing a user to run OpenClaw commands from that directory. The issue is classified as [CWE-427] Uncontrolled Search Path Element.

Critical Impact

Successful exploitation grants attackers arbitrary code execution under the invoking user's account, leading to full confidentiality, integrity, and availability compromise of the local user context.

Affected Products

  • OpenClaw (Node.js distribution) versions before 2026.4.23
  • OpenClaw bundled plugin setup resolver component (src/plugins/setup-registry.ts)
  • Any repository workflow invoking OpenClaw commands from an untrusted working directory

Discovery Timeline

  • 2026-05-11 - CVE-2026-45004 published to NVD
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2026-45004

Vulnerability Analysis

The vulnerability resides in OpenClaw's plugin setup resolver, which constructs candidate repository roots when locating bundled extension metadata. The resolver included process.cwd() as a fallback root when searching for extensions/<plugin>/setup-api.js. As a result, OpenClaw would load and execute JavaScript from the user's current working directory without validating its origin. Because Node.js executes loaded modules immediately, any code in the attacker-controlled setup-api.js runs with the privileges of the invoking user.

The attack does not require elevated privileges or network access. Exploitation depends on a user running OpenClaw inside a repository or directory under attacker influence, a common pattern for developer tooling that processes untrusted source trees. The result is full arbitrary code execution on the local host.

Root Cause

The root cause is an untrusted search path in the plugin setup resolver. The function built repoRootCandidates containing both the module-relative root and process.cwd(), then attempted to load setup-api.js from the first candidate that contained a matching extension directory. Loading executable code from process.cwd() violates the principle of trusted module resolution and matches the [CWE-427] pattern.

Attack Vector

An attacker commits a malicious extensions/<plugin>/setup-api.js to a repository. When a victim clones the repository and runs an OpenClaw command from that directory, the resolver evaluates process.cwd() and executes the attacker's JavaScript. The vector is local with user interaction, but the prerequisites map cleanly to standard developer workflows.

typescript
  }
 
  const bundledExtensionDir = path.basename(rootDir);
-  const repoRootCandidates = [
-    path.resolve(path.dirname(CURRENT_MODULE_PATH), "..", ".."),
-    process.cwd(),
-  ];
+  const repoRootCandidates = [path.resolve(path.dirname(CURRENT_MODULE_PATH), "..", "..")];
  for (const repoRoot of repoRootCandidates) {
    const sourceExtensionRoot = path.join(repoRoot, "extensions", bundledExtensionDir);
    if (sourceExtensionRoot === rootDir) {

Source: GitHub patch commit 993781e. The patch removes process.cwd() from the candidate list, eliminating the untrusted search path.

Detection Methods for CVE-2026-45004

Indicators of Compromise

  • Presence of an unexpected extensions/<plugin>/setup-api.js file within a cloned repository or working directory used to invoke OpenClaw.
  • Child processes spawned by the OpenClaw Node.js runtime that deviate from documented plugin behavior, such as shell invocations, outbound network connections, or file writes outside the project tree.
  • Modifications to user-writable persistence locations (shell profiles, scheduled tasks, SSH keys) shortly after running OpenClaw commands.

Detection Strategies

  • Inspect repositories for files matching the path pattern extensions/*/setup-api.js that are not part of the upstream OpenClaw distribution.
  • Audit command-line history for OpenClaw invocations executed from third-party repository directories.
  • Monitor Node.js process trees for unusual child process creation correlated with OpenClaw execution.

Monitoring Recommendations

  • Enable endpoint process telemetry to capture parent-child relationships for node processes launching OpenClaw.
  • Centralize developer workstation logs and alert on file creation events targeting setup-api.js within untrusted repository clones.
  • Track OpenClaw version inventory across developer endpoints to identify hosts still running versions earlier than 2026.4.23.

How to Mitigate CVE-2026-45004

Immediate Actions Required

  • Upgrade OpenClaw to version 2026.4.23 or later on all developer and build systems.
  • Audit existing repositories used with OpenClaw for unauthorized extensions/<plugin>/setup-api.js files and remove any not sourced from trusted upstreams.
  • Restrict OpenClaw execution to vetted repositories until patching is complete across the environment.

Patch Information

The vendor fix is implemented in commit 993781e6e6eaf50f033cfc3e3bf4f47059740707, which removes process.cwd() from the repoRootCandidates array in src/plugins/setup-registry.ts. Details are available in the GitHub Security Advisory GHSA-r39h-4c2p-3jxp and the VulnCheck advisory.

Workarounds

  • Run OpenClaw only from trusted directories that you control, such as a dedicated tooling workspace outside cloned third-party repositories.
  • Use a least-privilege user account for OpenClaw execution to limit the blast radius of arbitrary code execution.
  • Apply repository review policies that flag additions of extensions/*/setup-api.js files in pull requests.
bash
# Verify installed OpenClaw version and upgrade
npm ls -g openclaw
npm install -g openclaw@2026.4.23

# Scan a repository for the vulnerable plugin path before invoking OpenClaw
find . -path '*/extensions/*/setup-api.js' -print

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechOpenclaw

  • SeverityHIGH

  • CVSS Score8.4

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-427
  • Technical References
  • GitHub Security Advisory GHSA-r39h-4c2p-3jxp
  • Vendor Resources
  • GitHub Commit Details

  • VulnCheck Advisory on OpenClaw
  • Related CVEs
  • CVE-2026-44995: Openclaw RCE Vulnerability

  • CVE-2026-43584: OpenClaw RCE Vulnerability

  • CVE-2026-44115: OpenClaw RCE Vulnerability Explained

  • CVE-2026-44114: OpenClaw RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English