CVE-2026-27009 PUBLISHED

OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection

Assigner: GitHub_M
Reserved: 17.02.2026 Published: 19.02.2026 Updated: 20.02.2026

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a atored XSS issue in the OpenClaw Control UI when rendering assistant identity (name/avatar) into an inline <script> tag without script-context-safe escaping. A crafted value containing </script> could break out of the script tag and execute attacker-controlled JavaScript in the Control UI origin. Version 2026.2.15 removed inline script injection and serve bootstrap config from a JSON endpoint and added a restrictive Content Security Policy for the Control UI (script-src 'self', no inline scripts).

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
CVSS Score: 5.8

Product Status

Vendor openclaw
Product openclaw
Versions
  • Version < 2026.2.15 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE