OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions 2026.2.2 and below, when the Slack integration is enabled, channel metadata (topic/description) can be incorporated into the model's system prompt. Prompt injection is a documented risk for LLM-driven systems. This issue increases the injection surface by allowing untrusted Slack channel metadata to be treated as higher-trust system input. This issue has been fixed in version 2026.2.3.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/35eb40a7000b59085e9c638a80fd03917c7a095e | Patch |
| https://github.com/openclaw/openclaw/releases/tag/v2026.2.3 | Product Release Notes |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-782p-5fr5-7fj8 | Exploit Patch Vendor Advisory |
Configurations
History
19 Feb 2026, 18:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/35eb40a7000b59085e9c638a80fd03917c7a095e - Patch | |
| References | () https://github.com/openclaw/openclaw/releases/tag/v2026.2.3 - Product, Release Notes | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-782p-5fr5-7fj8 - Exploit, Patch, Vendor Advisory |
19 Feb 2026, 07:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 07:17
Updated : 2026-02-19 18:30
NVD link : CVE-2026-24764
Mitre link : CVE-2026-24764
CVE.ORG link : CVE-2026-24764
JSON object : View
Products Affected
openclaw
- openclaw
