High severity8.4NVD Advisory· Published Mar 31, 2026· Updated Apr 2, 2026
CVE-2026-32920
CVE-2026-32920
Description
OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verification, allowing arbitrary code execution. Attackers can execute malicious code by including crafted workspace plugins in cloned repositories that execute when users run OpenClaw from the directory.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openclawnpm | < 2026.3.12 | 2026.3.12 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-99qw-6mr3-36qrghsaADVISORY
- github.com/openclaw/openclaw/security/advisories/GHSA-99qw-6mr3-36qrnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-32920ghsaADVISORY
- www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-auto-discovery-of-workspace-pluginsnvdThird Party AdvisoryWEB
- github.com/openclaw/openclaw/releases/tag/v2026.3.12ghsaWEB
News mentions
0No linked articles in our index yet.