CVE-2026-27486

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below of the OpenClaw CLI, the process cleanup uses system-wide process enumeration and pattern matching to terminate processes without verifying if they are owned by the current OpenClaw process. On shared hosts, unrelated processes can be terminated if they match the pattern. The CLI runner cleanup helpers can kill processes matched by command-line patterns without validating process ownership. This issue has been fixed in version 2026.2.14.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

24 Feb 2026, 16:53

Type Values Removed Values Added
Summary
  • (es) OpenClaw es un asistente personal de IA. En las versiones 2026.2.13 e inferiores de la CLI de OpenClaw, la limpieza de procesos utiliza la enumeración de procesos a nivel de sistema y la coincidencia de patrones para terminar procesos sin verificar si son propiedad del proceso actual de OpenClaw. En hosts compartidos, los procesos no relacionados pueden ser terminados si coinciden con el patrón. Los ayudantes de limpieza del ejecutor de la CLI pueden eliminar procesos que coinciden con patrones de línea de comandos sin validar la propiedad del proceso. Este problema ha sido solucionado en la versión 2026.2.14.
References () https://github.com/openclaw/openclaw/commit/6084d13b956119e3cf95daaf9a1cae1670ea3557 - () https://github.com/openclaw/openclaw/commit/6084d13b956119e3cf95daaf9a1cae1670ea3557 - Patch
References () https://github.com/openclaw/openclaw/commit/eb60e2e1b213740c3c587a7ba4dbf10da620ca66 - () https://github.com/openclaw/openclaw/commit/eb60e2e1b213740c3c587a7ba4dbf10da620ca66 - Patch
References () https://github.com/openclaw/openclaw/releases/tag/v2026.2.14 - () https://github.com/openclaw/openclaw/releases/tag/v2026.2.14 - Release Notes
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-jfv4-h8mc-jcp8 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-jfv4-h8mc-jcp8 - Patch, Vendor Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Openclaw openclaw
Openclaw

21 Feb 2026, 10:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-21 10:16

Updated : 2026-02-24 16:53


NVD link : CVE-2026-27486

Mitre link : CVE-2026-27486

CVE.ORG link : CVE-2026-27486


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-283

Unverified Ownership