OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions 2026.2.2 and below, when the Slack integration is enabled, channel metadata (topic/description) can be incorporated into the model's system prompt. Prompt injection is a documented risk for LLM-driven systems. This issue increases the injection surface by allowing untrusted Slack channel metadata to be treated as higher-trust system input. This issue has been fixed in version 2026.2.3.
History

Thu, 19 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw openclaw
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw

Thu, 19 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Clawdbot
Clawdbot clawdbot
Vendors & Products Clawdbot
Clawdbot clawdbot

Thu, 19 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions 2026.2.2 and below, when the Slack integration is enabled, channel metadata (topic/description) can be incorporated into the model's system prompt. Prompt injection is a documented risk for LLM-driven systems. This issue increases the injection surface by allowing untrusted Slack channel metadata to be treated as higher-trust system input. This issue has been fixed in version 2026.2.3.
Title OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions
Weaknesses CWE-74
CWE-94
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-02-19T01:10:17.540Z

Updated: 2026-02-19T17:45:16.959Z

Reserved: 2026-01-26T21:06:47.867Z

Link: CVE-2026-24764

cve-icon Vulnrichment

Updated: 2026-02-19T17:05:04.460Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T07:17:44.957

Modified: 2026-02-19T18:30:39.867

Link: CVE-2026-24764

cve-icon Redhat

No data.