CVE-2026-41377
⚪ Do wiadomości
Luka w OpenClaw umożliwia instalację niezweryfikowanych wtyczek mimo ostrzeżeń o błędach skanowania.
CVSS
4.6
EPSS
0.0%
Exploit
none
Vendor
openclaw
Opis źródłowy (NVD)
OpenClaw before 2026.3.31 contains a fail-open vulnerability in the plugin installation flow where security scan failures do not block installation. Attackers can exploit scan failures to install untrusted plugins when operators proceed despite visible scan warnings.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 4.6 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-28 19:37:40 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 15:50:40 UTC |
Referencje
- https://github.com/openclaw/openclaw/commit/0d7f1e2c84eca65df7dee890d9c30e2a841c030a (disclosure@vulncheck.com) [Patch]
- https://github.com/openclaw/openclaw/commit/44b993613601280d46a5b88190e46669fc13d669 (disclosure@vulncheck.com) [Patch]
- https://github.com/openclaw/openclaw/commit/7a953a52271b9188a5fa830739a4366614ff9916 (disclosure@vulncheck.com) [Patch]
- https://github.com/openclaw/openclaw/commit/bf96c67fd1954740aeabfadc7cfe3098bcfc6b68 (disclosure@vulncheck.com) [Patch]
- https://github.com/openclaw/openclaw/security/advisories/GHSA-cwq8-6f96-g3q4 (disclosure@vulncheck.com) [Vendor Advisory]
- https://www.vulncheck.com/advisories/openclaw-fail-open-security-scan-bypass-in-plugin-installation (disclosure@vulncheck.com) [Third Party Advisory]