CVE-2026-45004 PUBLISHED

OpenClaw < 2026.4.23 - Arbitrary Code Execution via setup-api.js in Current Working Directory

Assigner: VulnCheck
Reserved: 08.05.2026 Published: 11.05.2026 Updated: 11.05.2026

OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript under the current user account by placing a malicious extensions/<plugin>/setup-api.js file in a repository and convincing a user to run OpenClaw commands from that directory.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.4

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.4.23 (excl.)
  • Version 2026.4.23 is unaffected

Credits

  • Mirr2 reporter

References

Problem Types

  • Uncontrolled Search Path Element CWE