CVE-2026-27485 PUBLISHED

OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection

Assigner: GitHub_M
Reserved: 19.02.2026 Published: 21.02.2026 Updated: 21.02.2026

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, skills/skill-creator/scripts/package_skill.py (a local helper script used when authors package skills) previously followed symlinks while building .skill archives. If an author runs this script on a crafted local skill directory containing symlinks to files outside the skill root, the resulting archive can include unintended file contents. If exploited, this vulnerability can lead to potential unintentional disclosure of local files from the packaging machine into a generated .skill artifact, but requires local execution of the packaging script on attacker-controlled skill contents. This issue has been fixed in version 2026.2.18.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 4.6

Product Status

Vendor openclaw
Product openclaw
Versions
  • Version < 2026.2.19 is affected

References

Problem Types

  • CWE-61: UNIX Symbolic Link (Symlink) Following CWE