Ad

CVE-2026-27487

HIGH CVSS 3.1: 7.6 EPSS 0.03%
Updated Feb 21, 2026
Openclaw
Parameter Value
CVSS 7.6 (HIGH)
Fixed In 2026.2.14
Type CWE-78 (OS Command Injection)
Vendor Openclaw
Public PoC No

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w .... Because OAuth tokens are user-controlled data, this created an OS command injection risk.

This issue has been fixed in version 2026.2.14.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
Low
Partial disruption

CVSS Vector v3.1

Weakness Type (CWE)