Vulnerability Description
OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git executable override. During npm install execution in the staged package directory, attackers can leverage git dependencies to trigger execution of arbitrary programs specified in the attacker-controlled .npmrc configuration file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.3.24 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/security/advisories/GHSA-m3mh-3mpg-37hwExploitMitigationVendor Advisory
- https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-npmrcThird Party Advisory
- https://github.com/openclaw/openclaw/security/advisories/GHSA-m3mh-3mpg-37hwExploitMitigationVendor Advisory
FAQ
What is CVE-2026-35641?
CVE-2026-35641 is a vulnerability with a CVSS score of 7.8 (HIGH). OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git ...
How severe is CVE-2026-35641?
CVE-2026-35641 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35641?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.