<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35641 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35641/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 17:17:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35641/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Arbitrary Code Execution via Malicious .npmrc File</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-code-exec/</link><pubDate>Fri, 10 Apr 2026 17:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-code-exec/</guid><description>OpenClaw before 2026.3.24 is vulnerable to arbitrary code execution via local plugin and hook installation, where an attacker can craft a .npmrc file with a git executable override to execute malicious code during npm install.</description><content:encoded><![CDATA[<p>OpenClaw versions before 2026.3.24 are susceptible to arbitrary code execution. The vulnerability lies in the local plugin and hook installation process. An attacker can exploit this by crafting a malicious <code>.npmrc</code> file that overrides the <code>git</code> executable. During the <code>npm install</code> execution within the staged package directory, the system inadvertently triggers the attacker&rsquo;s specified programs. This happens because <code>npm</code> leverages <code>git</code> dependencies, and the overridden <code>git</code> path points to a malicious executable. This can allow complete system compromise, depending on the permissions of the user running the <code>npm install</code> command. This vulnerability was reported on April 10, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target system running a vulnerable version of OpenClaw (prior to 2026.3.24).</li>
<li>Attacker crafts a malicious <code>.npmrc</code> file. This file contains a configuration that overrides the <code>git</code> executable path to point to a malicious binary under attacker control. For example, <code>git=path/to/malicious/executable</code>.</li>
<li>The attacker places the crafted <code>.npmrc</code> file in a location where the <code>npm</code> command will recognize it (e.g., the project directory, user&rsquo;s home directory, or a global configuration directory).</li>
<li>The attacker triggers an <code>npm install</code> command execution within a project that processes plugins or hooks.</li>
<li>During the <code>npm install</code> process, <code>npm</code> attempts to resolve git dependencies.</li>
<li>Due to the <code>.npmrc</code> configuration, <code>npm</code> executes the attacker-controlled &ldquo;git&rdquo; executable specified in the .npmrc file instead of the legitimate git binary.</li>
<li>The attacker-controlled executable executes arbitrary code on the system.</li>
<li>The attacker achieves arbitrary code execution, potentially leading to system compromise, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary code with the privileges of the user running the <code>npm install</code> command. This can lead to complete system compromise, sensitive data leakage, or denial-of-service. While the specific number of victims is unknown, any system running a vulnerable version of OpenClaw is at risk. Sectors most likely to be impacted are those relying on OpenClaw for plugin and hook management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.24 or later to patch the vulnerability (CVE-2026-35641).</li>
<li>Implement file integrity monitoring on <code>.npmrc</code> files to detect unauthorized modifications (file_event log source).</li>
<li>Monitor process executions where <code>npm</code> spawns child processes from unusual or unexpected paths, especially those outside standard installation directories (process_creation log source). Use the Sigma rule provided below to detect this behavior.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35641</category><category>code-execution</category><category>npm</category></item></channel></rss>