OpenClaw versions 2026.2.13 through 2026.3.24 contain an ANSI escape sequence injection vulnerability in approval prompts that allows attackers to spoof terminal output. Untrusted tool metadata can carry ANSI control sequences into approval prompts and permission logs, enabling attackers to manipulate displayed information through malicious tool titles.
References
Configurations
History
13 Apr 2026, 21:05
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/464e2c10a5edceb380d815adb6ff56e1a4c50f60 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-4hmj-39m8-jwc7 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-ansi-escape-sequence-injection-in-approval-prompt - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
10 Apr 2026, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 17:17
Updated : 2026-04-13 21:05
NVD link : CVE-2026-35651
Mitre link : CVE-2026-35651
CVE.ORG link : CVE-2026-35651
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-150
Improper Neutralization of Escape, Meta, or Control Sequences
