Ad

CVE-2026-35651

MEDIUM CVSS 4.0: 5.3 EPSS 0.03%
Updated Apr 10, 2026
OpenClaw
Parameter Value
CVSS 5.3 (MEDIUM)
Affected Versions 2026.2.13 — 2026.3.24
Type CWE-150
Vendor OpenClaw
Public PoC No

OpenClaw versions 2026.2.13 through 2026.3.24 contain an ANSI escape sequence injection vulnerability in approval prompts that allows attackers to spoof terminal output. Untrusted tool metadata can carry ANSI control sequences into approval prompts and permission logs, enabling attackers to manipulate displayed information through malicious tool titles.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
Passive
Minimal interaction

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v4.0

Weakness Type (CWE)