Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-782p-5fr5-7fj8 | OpenClaw Affected by Remote Code Execution via System Prompt Injection in Slack Channel Descriptions |
Thu, 19 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
Thu, 19 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Clawdbot
Clawdbot clawdbot |
|
| Vendors & Products |
Clawdbot
Clawdbot clawdbot |
Thu, 19 Feb 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions 2026.2.2 and below, when the Slack integration is enabled, channel metadata (topic/description) can be incorporated into the model's system prompt. Prompt injection is a documented risk for LLM-driven systems. This issue increases the injection surface by allowing untrusted Slack channel metadata to be treated as higher-trust system input. This issue has been fixed in version 2026.2.3. | |
| Title | OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions | |
| Weaknesses | CWE-74 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-19T17:45:16.959Z
Reserved: 2026-01-26T21:06:47.867Z
Link: CVE-2026-24764
Updated: 2026-02-19T17:05:04.460Z
Status : Analyzed
Published: 2026-02-19T07:17:44.957
Modified: 2026-02-19T18:30:39.867
Link: CVE-2026-24764
No data.
OpenCVE Enrichment
Updated: 2026-04-17T18:30:05Z
Github GHSA