Description
OpenClaw versions prior to 2026.2.23 contain an html injection vulnerability in the HTML session exporter that allows attackers to execute arbitrary javascript by injecting malicious mimeType values in image content blocks. Attackers can craft session entries with specially crafted mimeType attributes that break out of the img src data-URL context to achieve cross-site scripting when exported HTML is opened.
Published: 2026-03-19
Score: 2.4 Low
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

OpenClaw versions older than 2026.2.23 contain a stored cross‑site scripting flaw (CWE‑79) in the HTML session exporter. Attackers can embed malicious MIME type strings in image content blocks, which break out of the img src data‑URL context when the session is exported to HTML. This injection allows arbitrary JavaScript to run in the victim’s browser when the generated HTML is opened, enabling cookie theft, session hijacking, or other client‑side attacks.

Affected Systems

The vulnerability affects the OpenClaw product from OpenClaw. All releases before 2026.2.23 are impacted; administrators should verify the installed version and expose any installations below the patched release for remediation.

Risk and Exploitability

The CVSS score for this flaw is 2.4, indicating low severity, and no EPSS score is available. The flaw is not listed in the CISA KEV catalog. Exploitation requires an attacker to craft a malicious session entry with a forged MIME type and have a user open the resulting exported HTML file, so the attack vector is user interaction with a local file. Given the low score, widespread exploitation is unlikely, but vulnerable systems should be updated promptly to eliminate the risk.

Generated by OpenCVE AI on March 19, 2026 at 23:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.23 or later.
  • If an upgrade is not possible, validate image MIME types before exporting HTML to prevent injection.
  • Avoid opening exported HTML files from untrusted or unknown sources until the issue is resolved.
  • Regularly monitor the vendor’s channel for security updates and apply patches without delay.

Generated by OpenCVE AI on March 19, 2026 at 23:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2ww6-868g-2c56 OpenClaw Vulnerable to HTML injection via unvalidated image MIME type in data-URL interpolation
History

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.23 contain an html injection vulnerability in the HTML session exporter that allows attackers to execute arbitrary javascript by injecting malicious mimeType values in image content blocks. Attackers can craft session entries with specially crafted mimeType attributes that break out of the img src data-URL context to achieve cross-site scripting when exported HTML is opened.
Title OpenClaw < 2026.2.23 - HTML Injection via Unvalidated Image MIME Type in Data-URL Interpolation
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-79
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 2.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-21T03:12:57.671Z

Reserved: 2026-03-10T19:48:44.964Z

Link: CVE-2026-32040

cve-icon Vulnrichment

Updated: 2026-03-21T03:12:53.899Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T22:16:40.420

Modified: 2026-03-23T17:28:32.787

Link: CVE-2026-32040

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:44:14Z

Weaknesses