CVE-2026-32920 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 31, 2026
OpenClaw - Remote Code Execution
Overview
OpenClaw < 2026.3.12 contains a remote code execution caused by automatic loading of untrusted plugins from .OpenClaw/extensions/, letting attackers execute arbitrary code when running OpenClaw from crafted directories, exploit requires attacker to place malicious plugins in cloned repositories.
Severity & Score
Impact
Attackers can execute arbitrary code remotely by placing malicious plugins, potentially leading to full system compromise.
Mitigation
Update to version 2026.3.12 or later.
References
Social Media Activity(2 posts)
š“ CVE-2026-32920 - Critical (9.8) OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verification, allowing arbitrary code execution. Attackers can execute malicious code by including crafted workspace plugins in c... š https://www.thehackerwire.com/vulnerability/CVE-2026-32920/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-32920 - Critical (9.8) OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verification, allowing arbitrary code execution. Attackers can execute malicious code by including crafted workspace plugins in c... š https://www.thehackerwire.com/vulnerability/CVE-2026-32920/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-32920
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- unrestricted_file_upload
- Status
- new
- EPSS
- 5.3%
- Social Posts
- 2
CWE
- CWE-829
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H