Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m3mh-3mpg-37hw | OpenClaw has an Arbitrary Malicious Code Execution Vulnerability |
Tue, 14 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git executable override. During npm install execution in the staged package directory, attackers can leverage git dependencies to trigger execution of arbitrary programs specified in the attacker-controlled .npmrc configuration file. | |
| Title | OpenClaw < 2026.3.24 - Arbitrary Code Execution via .npmrc in Local Plugin/Hook Installation | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-349 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-14T14:30:49.773Z
Reserved: 2026-04-04T12:30:33.464Z
Link: CVE-2026-35641
Updated: 2026-04-14T14:30:38.354Z
Status : Modified
Published: 2026-04-10T17:17:04.697
Modified: 2026-04-14T15:16:30.090
Link: CVE-2026-35641
No data.
OpenCVE Enrichment
Updated: 2026-04-13T13:00:59Z
Github GHSA