๐Ÿ” CVE Alert

CVE-2026-24764

LOW 3.7

OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions

CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
0th

OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions 2026.2.2 and below, when the Slack integration is enabled, channel metadata (topic/description) can be incorporated into the model's system prompt. Prompt injection is a documented risk for LLM-driven systems. This issue increases the injection surface by allowing untrusted Slack channel metadata to be treated as higher-trust system input. This issue has been fixed in version 2026.2.3.

CWE CWE-74 CWE-94
Vendor clawdbot
Product clawdbot
Published Feb 19, 2026
Last Updated Feb 19, 2026
Stay Ahead of the Next One

Get instant alerts for clawdbot clawdbot

Be the first to know when new low vulnerabilities affecting clawdbot clawdbot are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

clawdbot / clawdbot
< 2026.2.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-782p-5fr5-7fj8 github.com: https://github.com/openclaw/openclaw/commit/35eb40a7000b59085e9c638a80fd03917c7a095e github.com: https://github.com/openclaw/openclaw/releases/tag/v2026.2.3