Command Injection Vulnerability in OpenClaw Personal AI Assistant
CVE-2026-25593
8.4HIGH
What is CVE-2026-25593?
Prior to version 2026.1.20, OpenClaw, a personal AI assistant, was susceptible to command injection via its Gateway WebSocket API. An unauthenticated local client could exploit this vulnerability to write configurations using the config.apply method, potentially leading to unsafe cliPath values being set. This flaw allowed unauthorized access to command discovery as the gateway user. The issue has been resolved in version 2026.1.20, emphasizing the importance of timely software updates and secure coding practices.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
openclaw < 2026.1.20
References
CVSS V3.1
Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
