CVE-2026-35651

OpenClaw versions 2026.2.13 through 2026.3.24 contain an ANSI escape sequence injection vulnerability in approval prompts that allows attackers to spoof terminal output. Untrusted tool metadata can carry ANSI control sequences into approval prompts and permission logs, enabling attackers to manipulate displayed information through malicious tool titles.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

13 Apr 2026, 21:05

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/commit/464e2c10a5edceb380d815adb6ff56e1a4c50f60 - () https://github.com/openclaw/openclaw/commit/464e2c10a5edceb380d815adb6ff56e1a4c50f60 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-4hmj-39m8-jwc7 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-4hmj-39m8-jwc7 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-ansi-escape-sequence-injection-in-approval-prompt - () https://www.vulncheck.com/advisories/openclaw-ansi-escape-sequence-injection-in-approval-prompt - Third Party Advisory
First Time Openclaw openclaw
Openclaw

10 Apr 2026, 17:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 17:17

Updated : 2026-04-13 21:05


NVD link : CVE-2026-35651

Mitre link : CVE-2026-35651

CVE.ORG link : CVE-2026-35651


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-150

Improper Neutralization of Escape, Meta, or Control Sequences