GHSA-99qw-6mr3-36qr

Suggest an improvement
Source
https://github.com/advisories/GHSA-99qw-6mr3-36qr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-99qw-6mr3-36qr/GHSA-99qw-6mr3-36qr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-99qw-6mr3-36qr
Aliases
  • CVE-2026-32920
Downstream
Published
2026-03-13T20:55:13Z
Modified
2026-04-06T23:05:09.456302Z
Severity
  • 8.5 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenClaw: Workspace plugin auto-discovery allowed code execution from cloned repositories
Details

Summary

OpenClaw automatically discovered and loaded plugins from .openclaw/extensions/ inside the current workspace without an explicit trust or install step. A malicious repository could include a crafted workspace plugin that executed as soon as a user ran OpenClaw from that cloned directory.

Impact

Opening or running OpenClaw in an untrusted repository could lead to arbitrary code execution under the user's account.

Affected versions

openclaw <= 2026.3.11

Patch

Fixed in openclaw 2026.3.12. Workspace plugin loading now requires explicit trusted state before execution. Users should update to 2026.3.12 or later and avoid running OpenClaw inside untrusted repositories on older releases.

Database specific
{
    "nvd_published_at": null,
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-829"
    ],
    "github_reviewed_at": "2026-03-13T20:55:13Z"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.12

Database specific

last_known_affected_version_range
"<= 2026.3.11"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-99qw-6mr3-36qr/GHSA-99qw-6mr3-36qr.json"