CVE-2026-41295
Received Received - Intake
Improper Trust Boundary in OpenClaw Enables In-Process Code Execution

Publication date: 2026-04-21

Last updated on: 2026-04-27

Assigner: VulnCheck

Description
OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability allowing untrusted workspace channel shadows to execute during built-in channel setup and login. Attackers can clone a workspace with a malicious plugin claiming a bundled channel id to achieve unintended in-process code execution before the plugin is explicitly trusted.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-829 The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in OpenClaw allows untrusted workspace channel shadows to execute code during built-in channel setup and login, enabling attackers to run arbitrary code early in the process. This can lead to unauthorized code execution and potential compromise of system integrity.

Such unauthorized code execution risks can impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over data integrity, confidentiality, and system security to protect personal and sensitive information.

If exploited, this vulnerability could lead to unauthorized access or manipulation of data, thereby violating regulatory requirements for data protection and security controls.


Can you explain this vulnerability to me?

CVE-2026-41295 is a vulnerability in OpenClaw versions before 2026.4.2 where untrusted workspace channel shadows can execute code during the built-in channel setup and login process.

Attackers exploit this by cloning a workspace containing a malicious plugin that falsely claims a bundled channel ID, allowing unintended in-process code execution before the plugin is explicitly trusted.

This happens because the system improperly trusts untrusted workspace plugins too early, enabling malicious code to run during channel setup.


How can this vulnerability impact me? :

This vulnerability allows attackers to execute arbitrary code within the OpenClaw process early in the channel setup phase.

  • Attackers can bypass the workspace-plugin trust boundary.
  • Malicious plugins can hijack or interfere with core channel setup and login functionality.
  • This can lead to privilege escalation or unauthorized code execution.

Overall, it poses significant security risks by allowing untrusted code to run before proper validation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves untrusted workspace channel shadows executing during built-in channel setup and login in OpenClaw versions prior to 2026.4.2. Detection would involve identifying if your OpenClaw installation is running a vulnerable version and if any workspace plugins are present that claim bundled channel IDs without being explicitly trusted.

Since the vulnerability is related to plugin trust boundaries within OpenClaw, detection commands would focus on checking the installed OpenClaw version and inspecting workspace plugins configuration.

  • Check OpenClaw version to confirm if it is prior to 2026.4.2: `openclaw --version` or equivalent command.
  • List installed workspace plugins and verify their trust status in the configuration files or plugin management interface.
  • Audit logs or monitoring for unexpected code execution during channel setup or login phases may help detect exploitation attempts.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade OpenClaw to version 2026.4.2 or later, where this vulnerability has been fixed by ignoring untrusted workspace channel shadows during setup and login.

Additionally, ensure that only explicitly trusted workspace plugins are enabled in your configuration to prevent untrusted plugins from executing during channel setup.

  • Upgrade OpenClaw to version 2026.4.2 or newer.
  • Review and restrict workspace plugin configurations to trust only verified plugins.
  • Monitor system logs for suspicious activity related to channel setup and plugin execution.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart