CVE-2026-43571
Plugin Trust Bypass in OpenClaw Before 2026.4.10
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.4.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-829 | The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-43571 is a plugin trust bypass vulnerability in OpenClaw versions before 2026.4.10. It occurs because channel setup catalog lookups can resolve workspace plugin shadows before bundled channel plugins, allowing malicious workspace plugins to bypass intended trust gates during setup-time plugin loading.
This means attackers can craft malicious plugins that get loaded without proper trust validation, potentially leading to unauthorized code execution or privilege escalation within the OpenClaw environment.
How can this vulnerability impact me? :
This vulnerability can allow attackers to bypass security checks during plugin setup, leading to unauthorized plugin loading.
- Unauthorized code execution within the OpenClaw environment.
- Privilege escalation by loading malicious plugins that should have been blocked.
- Potential misconfigurations or unauthorized changes to the system due to untrusted plugins being installed.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability CVE-2026-43571 in OpenClaw, users should upgrade their OpenClaw installation to version 2026.4.10 or later, as these versions include the fix that prevents untrusted workspace plugin shadows from bypassing trust gates during setup-time plugin loading.
The fix involves routing setup catalog lookups through trusted catalog paths and using the excludeWorkspace: true option to exclude workspace shadows where appropriate, ensuring that only trusted plugins are loaded.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided resources do not include specific detection methods or commands to identify the presence of this vulnerability on a network or system.