Vulnerability Description
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action handling (timeout, kick, ban) uses sender identity from request parameters in tool-driven flows, instead of trusted runtime sender context. In setups where Discord moderation actions are enabled and the bot has the necessary guild permissions, a non-admin user can request moderation actions by spoofing sender identity fields. This issue has been fixed in version 2026.2.18.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | <= 2026.2.17 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/775816035ecc6bb243843f8000c9a58ff609Patch
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.19Release Notes
- https://github.com/openclaw/openclaw/security/advisories/GHSA-wh94-p5m6-mr7jVendor Advisory
FAQ
What is CVE-2026-27484?
CVE-2026-27484 is a vulnerability with a CVSS score of 4.3 (MEDIUM). OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action handling (timeout, kick, ban) uses sender identity from request parameters in tool-driven flows, ins...
How severe is CVE-2026-27484?
CVE-2026-27484 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27484?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.