CVE-2026-28456
Summary
OpenClaw Gateway supports hook mappings with optional JavaScript/TypeScript transform modules. In affected versions, the gateway did not sufficiently constrain configured module paths before passing them to dynamic import(). Under some configurations, a user who can modify gateway configuration could cause the gateway process to load and execute an unintended local module.
Impact
Potential code execution in the OpenClaw gateway Node.js process.
This requires access that can modify gateway configuration (for example via the gateway config endpoints). Treat such access as high privilege.
Affected Packages / Versions
- npm package:
openclaw - Affected:
>= 2026.1.5and<= 2026.2.13
Patched Versions
>= 2026.2.14
Fix Commit(s)
a0361b8ba959e8506dc79d638b6e6a00d12887e4(restrict hook transform module loading)35c0e66ed057f1a9f7ad2515fdcef516bd6584ce(harden hooks module loading)
Mitigation
- Upgrade to
2026.2.14or newer. - Avoid exposing gateway configuration endpoints to untrusted networks.
- Review config for unsafe values:
hooks.mappings[].transform.modulehooks.internal.handlers[].module
Thanks @222n5 for reporting.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/openclaw/openclaw/security/advisories/GHSA-v6c6-vqqg-w888, https://nvd.nist.gov/vuln/detail/CVE-2026-28456, https://github.com/openclaw/openclaw/commit/35c0e66ed057f1a9f7ad2515fdcef516bd6584ce, https://github.com/openclaw/openclaw/commit/a0361b8ba959e8506dc79d638b6e6a00d12887e4, https://github.com/openclaw/openclaw, https://github.com/openclaw/openclaw/releases/tag/v2026.2.14, https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-unsafe-hook-module-path-handling
