OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling command injection as the gateway user. This vulnerability is fixed in 2026.1.20.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Vendors & Products |
Openclaw
Openclaw openclaw |
Fri, 06 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling command injection as the gateway user. This vulnerability is fixed in 2026.1.20. | |
| Title | OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply | |
| Weaknesses | CWE-306 CWE-78 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-06T20:56:02.824Z
Updated: 2026-02-09T15:27:48.829Z
Reserved: 2026-02-03T01:02:46.716Z
Link: CVE-2026-25593
Updated: 2026-02-09T15:20:46.234Z
Status : Awaiting Analysis
Published: 2026-02-06T21:16:17.790
Modified: 2026-02-06T21:57:22.450
Link: CVE-2026-25593
No data.