Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8mh7-phf8-xgfm | OpenClaw skills.status could leak secrets to operator.read clients |
Mon, 23 Feb 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
Fri, 20 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Vendors & Products |
Openclaw
Openclaw openclaw |
Thu, 19 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw is a personal AI assistant. Prior to version 2026.2.14, `skills.status` could disclose secrets to `operator.read` clients by returning raw resolved config values in `configChecks` for skill `requires.config` paths. Version 2026.2.14 stops including raw resolved config values in requirement checks (return only `{ path, satisfied }`) and narrows the Discord skill requirement to the token key. In addition to upgrading, users should rotate any Discord tokens that may have been exposed to read-scoped clients. | |
| Title | OpenClaw skills.status could leak secrets to operator.read clients | |
| Weaknesses | CWE-200 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T15:39:29.706Z
Reserved: 2026-02-13T16:27:51.808Z
Link: CVE-2026-26326
Updated: 2026-02-20T15:27:17.228Z
Status : Analyzed
Published: 2026-02-19T23:16:25.950
Modified: 2026-02-23T13:46:15.530
Link: CVE-2026-26326
No data.
OpenCVE Enrichment
Updated: 2026-04-17T18:00:12Z
Github GHSA