` could break out of the script tag and execute attacker-controlled JavaScript in the Control UI origin. Version 2026.2.15 removed inline script injection and serve bootstrap config from a JSON endpoint and added a restrictive Content Security Policy for the Control UI (`script-src 'self'`, no inline scripts).","articleSection":"Information Security","identifier":"CVE-2026-27009","datePublished":"2026-02-20T00:16:17.620","dateModified":"2026-02-20T17:41:44.670","author":{"@type":"Organization","name":"NIST National Vulnerability Database","url":"https://nvd.nist.gov/"},"publisher":{"@type":"Organization","name":"CVEDatabase.com","logo":{"@type":"ImageObject","url":"https://cvedatabase.com/logo.png"}},"mainEntityOfPage":{"@type":"WebPage","@id":"https://cvedatabase.com/cve/CVE-2026-27009"},"about":{"@type":"Thing","name":"MEDIUM","description":"CVSS Score: 5.8"}}
HomeOpenclawCVE-2026-27009

CVE-2026-27009

MEDIUM
5.8CVSS
Published: 2026-02-20
Updated: 2026-02-20
AI Analysis

Description

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a atored XSS issue in the OpenClaw Control UI when rendering assistant identity (name/avatar) into an inline `<script>` tag without script-context-safe escaping. A crafted value containing `</script>` could break out of the script tag and execute attacker-controlled JavaScript in the Control UI origin. Version 2026.2.15 removed inline script injection and serve bootstrap config from a JSON endpoint and added a restrictive Content Security Policy for the Control UI (`script-src 'self'`, no inline scripts).

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Attack Vector
local
Complexity
low
Privileges
high
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-79

Metadata

Primary Vendor
OPENCLAW
Published
2/20/2026
Last Modified
2/20/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

openclaw : openclaw

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief