ANSI Escape Sequence Injection Vulnerability in OpenClaw by OpenClaw
CVE-2026-35651

5.3MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
10 April 2026

What is CVE-2026-35651?

OpenClaw versions 2026.2.13 through 2026.3.24 are affected by a vulnerability that permits ANSI escape sequence injection in approval prompts. This security concern allows attackers to exploit untrusted tool metadata, which can include ANSI control sequences, resulting in manipulated information in terminal output. By using malicious tool titles, an attacker can deceive users into seeing altered content in approval prompts and permission logs, potentially compromising user trust and system security.

Affected Version(s)

OpenClaw 2026.2.13 <= 2026.3.24

OpenClaw 2026.3.25

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nathan (@nexrin)
KeenSecurityLab
.