OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very large prompt text blocks and can assemble oversized prompt payloads before forwarding them to chat.send. Because ACP runs over local stdio, this mainly affects local ACP clients (for example IDE integrations) that send unusually large inputs. This issue has been fixed in version 2026.2.19.
References
Configurations
History
23 Feb 2026, 20:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/63e39d7f57ac4ad4a5e38d17e7394ae7c4dd0b9c - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/8ae2d5110f6ceadef73822aa3db194fb60d2ba68 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/ebcf19746f5c500a41817e03abecadea8655654a - Patch | |
| References | () https://github.com/openclaw/openclaw/releases/tag/v2026.2.19 - Release Notes | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-cxpw-2g23-2vgw - Vendor Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.0 |
| First Time |
Openclaw openclaw
Openclaw |
21 Feb 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-21 10:16
Updated : 2026-02-23 20:39
NVD link : CVE-2026-27576
Mitre link : CVE-2026-27576
CVE.ORG link : CVE-2026-27576
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-400
Uncontrolled Resource Consumption
