Impact
The flaw allows ANSI escape sequences to be injected into OpenClaw’s approval prompts and permission logs. When an attacker supplies or alters tool metadata that contains malicious control characters, the terminal output can be manipulated. This can mislead users, obscuring the true state of permissions or disguising malicious actions. The underlying weakness lies in the incorrect validation of control characters (CWE‑150).
Affected Systems
OpenClaw versions 2026.2.13 through 2026.3.24 are affected. The product runs on Node.js and is identified by the CPE string cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* . Any deployment using these releases is susceptible unless the tool metadata is trusted or sanitized.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate risk. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an adversary who can influence tool metadata – for example, through a compromised package or an exploited import – thereby injecting ANSI escape sequences. The effect is loss of trust in terminal displays and logs, potentially leading to user deception or unintended approval of operations.
OpenCVE Enrichment
Github GHSA