Untrusted Search Path Affecting openclaw package, versions <2026.3.24


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-OPENCLAW-15857116
  • published31 Mar 2026
  • disclosed30 Mar 2026
  • credit妙尽璇机

Introduced: 30 Mar 2026

New CVE NOT AVAILABLE CWE-426  (opens in a new tab)

How to fix?

Upgrade openclaw to version 2026.3.24 or higher.

Overview

openclaw is a 🦞 OpenClaw — Personal AI Assistant

Affected versions of this package are vulnerable to Untrusted Search Path in the installation of local plugins or hooks, specifically when executing npm install --omit=dev --silent --ignore-scripts within a staged directory that may contain an attacker-controlled .npmrc file. An attacker can achieve arbitrary code execution by supplying a malicious .npmrc that overrides the git executable path and including a git dependency, causing npm to invoke an attacker-controlled program during installation.

CVSS Base Scores

version 4.0
version 3.1