CVE-2026-28456
Published: 05 March 2026
Summary
CVE-2026-28456 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes an RCE flaw in a network-exposed Gateway component (AV:N) via unsafe dynamic import() of attacker-controlled Node.js modules after config modification, directly enabling exploitation of public-facing apps (T1190) followed by arbitrary JavaScript execution (T1059.007).
NVD Description
OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can…
more
load and execute unintended local modules in the Node.js process.
Deeper analysisAI
CVE-2026-28456 is a vulnerability in the Gateway component of OpenClaw versions 2026.1.5 prior to 2026.2.14. The issue stems from insufficient constraints on configured hook module paths before they are passed to the dynamic import() function in the Node.js process, allowing arbitrary code execution. Classified as CWE-427 (Uncontrolled Search Path Element), it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-05.
An attacker with access to modify the gateway configuration can exploit this flaw to load and execute unintended local modules in the Node.js process. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability within the Gateway, potentially leading to full control over the affected process.
Mitigation involves updating to OpenClaw version 2026.2.14 or later, as detailed in the GitHub security advisory GHSA-v6c6-vqqg-w888 and fixing commits such as 35c0e66ed057f1a9f7ad2515fdcef516bd6584ce and a0361b8ba959e8506dc79d638b6e6a00d12887e4. Additional analysis is provided in the VulnCheck advisory at https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-unsafe-hook-module-path-handling.
Details
- CWE(s)