GHSA-2qrv-rc5x-2g2h: OpenClaw: untrusted plugin RCE via workspace channel setup
GHSA-2qrv-rc5x-2g2h MEDIUMOpenClaw versions <= 2026.4.1 allow a disabled, untrusted workspace plugin to execute arbitrary in-process code by claiming a bundled channel identifier during workspace setup or login — no explicit user trust decision is required, only cloning a malicious workspace triggers execution. This is a trust-boundary bypass at the most sensitive moment in the agent lifecycle: initialization, before security controls are fully applied. With 37 prior CVEs in the openclaw package and confirmed in-the-wild abuse of its plugin ecosystem (AIID #1368 documented roughly 17% malicious skills in OpenClaw's ClawHub actively exfiltrating credentials), the attack surface is not theoretical — threat actors are already targeting OpenClaw's plugin trust model. Patch all openclaw deployments to >= 2026.4.2 immediately and audit any recently cloned or imported workspaces for unrecognized plugin registrations.
Risk Assessment
Medium severity per CVSS but contextually elevated for AI agent deployments. The trust bypass occurs at setup time, making detection harder than runtime exploits — the plugin runs before the user has a chance to review or reject it. Exploitation requires a victim to clone a malicious workspace, which is achievable via social engineering, malicious workspace marketplaces, or supply chain compromise of shared workspace templates. No public exploit or CISA KEV listing currently, but the pattern aligns precisely with active abuse documented in AIID #1368. Environments where teams share or clone external workspaces face immediate elevated risk.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | <= 2026.4.1 | 2026.4.2 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Patch: Upgrade openclaw to >= 2026.4.2 immediately across all environments.
- Audit: Review all workspace configurations for unknown or unexpected plugin registrations, especially in recently cloned workspaces.
- Restrict: Enforce workspace provenance policies — only allow workspaces from trusted internal sources until patch is confirmed deployed.
- Detect: Monitor for unexpected plugin activation events during channel setup/login in agent logs.
- Isolate: Run OpenClaw agent processes with least-privilege permissions to limit blast radius if exploitation has already occurred.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Technical Details
NVD Description
## Summary Before OpenClaw 2026.4.2, built-in channel setup and login could resolve an untrusted workspace channel shadow before the plugin was explicitly trusted. A malicious workspace plugin that claimed a bundled channel id could execute during channel setup even while still disabled. ## Impact A cloned workspace could turn channel setup for a built-in channel into unintended in-process code execution from an untrusted workspace plugin. This bypassed the intended workspace-plugin trust boundary during setup and login. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= 2026.4.1` - Patched versions: `>= 2026.4.2` - Latest published npm version: `2026.4.1` ## Fix Commit(s) - `53c29df2a9eb242a70d0ff29f3d1e67c8d6801f0` — ignore untrusted workspace channel shadows during setup resolution ## Release Process Note The fix is present on `main` and is staged for OpenClaw `2026.4.2`. Publish this advisory after the `2026.4.2` npm release is live. Thanks @zpbrent for reporting.
Exploitation Scenario
An adversary publishes a malicious workspace on a public sharing platform or compromises an existing trusted workspace template. The workspace contains a plugin that claims a bundled channel identifier matching a built-in OpenClaw channel. When a victim developer or operator clones the workspace and initiates channel setup or logs in, OpenClaw resolves the channel shadow without verifying plugin trust status, executing the malicious plugin in-process. The plugin can then enumerate credentials stored in the agent configuration, exfiltrate API keys, establish persistence, or laterally pivot to connected AI services — all before the user sees any trust prompt. This mirrors the exact credential-theft pattern observed in AIID #1368.
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert