CVE-2026-35641 - Vulnerability Analysis
HighCVSS: 7.8Last Updated: April 13, 2026
OpenClaw - Command Injection
Overview
OpenClaw before 2026.3.24 contains a command injection vulnerability caused by crafted .npmrc file with git executable override in local plugin and hook installation, letting attackers execute arbitrary code during npm install, exploit requires attacker to craft malicious .npmrc file.
Severity & Score
Impact
Attackers can execute arbitrary code during npm install, potentially leading to full system compromise.
Mitigation
Update to version 2026.3.24 or later.
References
Social Media Activity(1 post)
š CVE-2026-35641 - High (7.8) OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git executable override. During npm install executi... š https://www.thehackerwire.com/vulnerability/CVE-2026-35641/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-35641
- Severity
- High
- CVSS Score
- 7.8
- Type
- command_injection
- Status
- confirmed
- EPSS
- 0.7%
- Social Posts
- 1
CWE
- CWE-349
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H