Vulnerability Description
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, `skills.status` could disclose secrets to `operator.read` clients by returning raw resolved config values in `configChecks` for skill `requires.config` paths. Version 2026.2.14 stops including raw resolved config values in requirement checks (return only `{ path, satisfied }`) and narrows the Discord skill requirement to the token key. In addition to upgrading, users should rotate any Discord tokens that may have been exposed to read-scoped clients.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.2.14 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/d3428053d95eefbe10ecf04f92218ffcba55Patch
- https://github.com/openclaw/openclaw/commit/ebc68861a61067fc37f9298bded3eec9de0bPatch
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.14ProductRelease Notes
- https://github.com/openclaw/openclaw/security/advisories/GHSA-8mh7-phf8-xgfmPatchVendor Advisory
FAQ
What is CVE-2026-26326?
CVE-2026-26326 is a vulnerability with a CVSS score of 4.3 (MEDIUM). OpenClaw is a personal AI assistant. Prior to version 2026.2.14, `skills.status` could disclose secrets to `operator.read` clients by returning raw resolved config values in `configChecks` for skill `...
How severe is CVE-2026-26326?
CVE-2026-26326 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-26326?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.