Dismissed
by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt dismissed
OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package Name
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing path traversal sequences like .. to write files outside the intended installation directory when victims run the plugins install command.
References
-
GitHub Security Advisory (GHSA-qrq5-wjgg-rvqw) vendor-advisory
-
Patch Commit patch
Affected products
OpenClaw
- <2026.2.1
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>