Impact
OpenClaw, a locally run AI assistant, incorporates Slack channel metadata into its system prompt when the Slack integration is enabled. This design allows an attacker to inject malicious content through the channel’s topic or description, causing the language model to execute unintended commands. The vulnerability is a form of code injection, mapped to CWE-74 and CWE-94, and provides a direct pathway to arbitrary code execution on the host running OpenClaw.
Affected Systems
The flaw affects OpenClaw versions 2026.2.2 and earlier, including the original Clawdbot release. The software runs on Node.js environments and is distributed via the openclaw GitHub repository. The issue is specific to installations that have enabled the Slack integration.
Risk and Exploitability
The CVSS score of 3.7 indicates low to moderate severity, yet the impact of remote code execution cannot be ignored. The EPSS score of less than 1% suggests a low probability of active exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, an attacker who gains the ability to post or edit a Slack channel’s topic or description can trigger the injection, potentially compromising the entire host machine. Prompt mitigation is advised to prevent any potential compromise.
OpenCVE Enrichment
Github GHSA