OpenClaw is a personal AI assistant. In versions 2026.2.13 and below of the OpenClaw CLI, the process cleanup uses system-wide process enumeration and pattern matching to terminate processes without verifying if they are owned by the current OpenClaw process. On shared hosts, unrelated processes can be terminated if they match the pattern. The CLI runner cleanup helpers can kill processes matched by command-line patterns without validating process ownership. This issue has been fixed in version 2026.2.14.
References
Configurations
History
24 Feb 2026, 16:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/openclaw/openclaw/commit/6084d13b956119e3cf95daaf9a1cae1670ea3557 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/eb60e2e1b213740c3c587a7ba4dbf10da620ca66 - Patch | |
| References | () https://github.com/openclaw/openclaw/releases/tag/v2026.2.14 - Release Notes | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-jfv4-h8mc-jcp8 - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| First Time |
Openclaw openclaw
Openclaw |
21 Feb 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-21 10:16
Updated : 2026-02-24 16:53
NVD link : CVE-2026-27486
Mitre link : CVE-2026-27486
CVE.ORG link : CVE-2026-27486
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-283
Unverified Ownership
