๐Ÿ” CVE Alert

CVE-2026-26323

UNKNOWN 0.0

OpenClaw has a command injection in maintainer clawtributors updater

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script `scripts/update-clawtributors.ts`. The issue affects contributors/maintainers (or CI) who run `bun scripts/update-clawtributors.ts` in a source checkout that contains a malicious commit author email (e.g. crafted `@users[.]noreply[.]github[.]com` values). Normal CLI usage is not affected (`npm i -g openclaw`): this script is not part of the shipped CLI and is not executed during routine operation. The script derived a GitHub login from `git log` author metadata and interpolated it into a shell command (via `execSync`). A malicious commit record could inject shell metacharacters and execute arbitrary commands when the script is run. Version 2026.2.14 contains a patch.

CWE CWE-78
Vendor openclaw
Product openclaw
Published Feb 19, 2026
Last Updated Feb 20, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new unknown vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

openclaw / openclaw
>= 2026.1.8, < 2026.2.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-m7x8-2w3w-pr42 github.com: https://github.com/openclaw/openclaw/commit/a429380e337152746031d290432a4b93aa553d55 github.com: https://github.com/openclaw/openclaw/releases/tag/v2026.2.14