CVE-2026-27576

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very large prompt text blocks and can assemble oversized prompt payloads before forwarding them to chat.send. Because ACP runs over local stdio, this mainly affects local ACP clients (for example IDE integrations) that send unusually large inputs. This issue has been fixed in version 2026.2.19.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

23 Feb 2026, 20:39

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/63e39d7f57ac4ad4a5e38d17e7394ae7c4dd0b9c - () https://github.com/openclaw/openclaw/commit/63e39d7f57ac4ad4a5e38d17e7394ae7c4dd0b9c - Patch
References () https://github.com/openclaw/openclaw/commit/8ae2d5110f6ceadef73822aa3db194fb60d2ba68 - () https://github.com/openclaw/openclaw/commit/8ae2d5110f6ceadef73822aa3db194fb60d2ba68 - Patch
References () https://github.com/openclaw/openclaw/commit/ebcf19746f5c500a41817e03abecadea8655654a - () https://github.com/openclaw/openclaw/commit/ebcf19746f5c500a41817e03abecadea8655654a - Patch
References () https://github.com/openclaw/openclaw/releases/tag/v2026.2.19 - () https://github.com/openclaw/openclaw/releases/tag/v2026.2.19 - Release Notes
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-cxpw-2g23-2vgw - () https://github.com/openclaw/openclaw/security/advisories/GHSA-cxpw-2g23-2vgw - Vendor Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.0
First Time Openclaw openclaw
Openclaw

21 Feb 2026, 10:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-21 10:16

Updated : 2026-02-23 20:39


NVD link : CVE-2026-27576

Mitre link : CVE-2026-27576

CVE.ORG link : CVE-2026-27576


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-400

Uncontrolled Resource Consumption