Description
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a atored XSS issue in the OpenClaw Control UI when rendering assistant identity (name/avatar) into an inline `<script>` tag without script-context-safe escaping. A crafted value containing `</script>` could break out of the script tag and execute attacker-controlled JavaScript in the Control UI origin. Version 2026.2.15 removed inline script injection and serve bootstrap config from a JSON endpoint and added a restrictive Content Security Policy for the Control UI (`script-src 'self'`, no inline scripts).
Published: 2026-02-19
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting on the Control UI
Action: Patch
AI Analysis

Impact

OpenClaw, a personal AI assistant, suffered a stored cross‑site scripting vulnerability in its Control UI. Prior to version 2026.2.15 the assistant identity (name and avatar) was rendered directly into an inline <script> tag without context‑safe escaping. A malicious value containing the sequence </script> can terminate the tag and inject arbitrary JavaScript that runs in the context of the Control UI origin, potentially allowing an attacker to steal authentication tokens, perform phishing, or manipulate the application. The weakness is classified as CWE‑79 and is exploitable whenever an attacker can create or modify an assistant entry.

Affected Systems

All OpenClaw installations running a pre‑2026.2.15 build are vulnerable. The issue affects the OpenClaw product deployed with any node.js runtime. The vulnerability is present in all earlier releases up to, but not including, the 2026.2.15 version, which is the first release to address the flaw.

Risk and Exploitability

The CVSS score of 5.8 indicates a moderate severity. EPSS shows a probability of less than 1 %, suggesting low but nonzero likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, implying that known exploits are not publicly confirmed. Exploitation requires the attacker to insert a crafted assistant name or avatar that contains a closing script tag; from that point, any user who visits the Control UI will have the attacker's JavaScript executed in the page’s origin. The attack vector appears to be local to the Control UI—an attacker who can configure or alter assistant identities can trigger the injection, but remote execution from arbitrary users is unlikely without such access.

Generated by OpenCVE AI on April 18, 2026 at 11:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.15 or later, which removes inline script injection and enforces a strict CSP.
  • If an immediate upgrade is not possible, avoid using or applying any assistant configurations that contain untrusted or custom names or avatars.
  • Configure the Control UI to disallow inline scripts and enforce a CSP such as "script-src 'self'" in your host environment.

Generated by OpenCVE AI on April 18, 2026 at 11:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-37gc-85xm-2ww6 OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection
History

Fri, 20 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw openclaw
Vendors & Products Openclaw
Openclaw openclaw

Thu, 19 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a atored XSS issue in the OpenClaw Control UI when rendering assistant identity (name/avatar) into an inline `<script>` tag without script-context-safe escaping. A crafted value containing `</script>` could break out of the script tag and execute attacker-controlled JavaScript in the Control UI origin. Version 2026.2.15 removed inline script injection and serve bootstrap config from a JSON endpoint and added a restrictive Content Security Policy for the Control UI (`script-src 'self'`, no inline scripts).
Title OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-20T15:36:57.938Z

Reserved: 2026-02-17T03:08:23.489Z

Link: CVE-2026-27009

cve-icon Vulnrichment

Updated: 2026-02-20T15:29:25.780Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T00:16:17.620

Modified: 2026-02-20T17:41:44.670

Link: CVE-2026-27009

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:45:44Z

Weaknesses