Cyber Posture

CVE-2026-28456

HighPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 26.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28456 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

The CVE describes an RCE flaw in a network-exposed Gateway component (AV:N) via unsafe dynamic import() of attacker-controlled Node.js modules after config modification, directly enabling exploitation of public-facing apps (T1190) followed by arbitrary JavaScript execution (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can…

more

load and execute unintended local modules in the Node.js process.

Deeper analysisAI

CVE-2026-28456 is a vulnerability in the Gateway component of OpenClaw versions 2026.1.5 prior to 2026.2.14. The issue stems from insufficient constraints on configured hook module paths before they are passed to the dynamic import() function in the Node.js process, allowing arbitrary code execution. Classified as CWE-427 (Uncontrolled Search Path Element), it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-05.

An attacker with access to modify the gateway configuration can exploit this flaw to load and execute unintended local modules in the Node.js process. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability within the Gateway, potentially leading to full control over the affected process.

Mitigation involves updating to OpenClaw version 2026.2.14 or later, as detailed in the GitHub security advisory GHSA-v6c6-vqqg-w888 and fixing commits such as 35c0e66ed057f1a9f7ad2515fdcef516bd6584ce and a0361b8ba959e8506dc79d638b6e6a00d12887e4. Additional analysis is provided in the VulnCheck advisory at https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-unsafe-hook-module-path-handling.

Details

CWE(s)

Affected Products

openclaw
openclaw
2026.1.5 — 2026.2.14

CVEs Like This One

CVE-2026-29610Same product: Openclaw Openclaw
CVE-2026-32041Same product: Openclaw Openclaw
CVE-2026-28465Same product: Openclaw Openclaw
CVE-2026-31998Same product: Openclaw Openclaw
CVE-2026-32975Same product: Openclaw Openclaw
CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-22171Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-35622Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw

References