Vulnerability Description
OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error messages and stack traces (for example, when request URLs include `https://api.telegram.org/bot<token>/...`). Prior to version 2026.2.15, OpenClaw logged these strings without redaction, which could leak the bot token into logs, crash reports, CI output, or support bundles. Disclosure of a Telegram bot token allows an attacker to impersonate the bot and take over Bot API access. Users should upgrade to version 2026.2.15 to obtain a fix and rotate the Telegram bot token if it may have been exposed.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.2.15 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/cf69907015b659e5025efb735ee31bd05c4ePatch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-chf7-jq6g-qrwvVendor AdvisoryPatch
FAQ
What is CVE-2026-27003?
CVE-2026-27003 is a vulnerability with a CVSS score of 5.5 (MEDIUM). OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error messages and stack traces (for example, when request URLs include `https://api.telegram.org/bot<token>/...`). Prior to vers...
How severe is CVE-2026-27003?
CVE-2026-27003 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27003?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.