AVID-2026-R0243
Description
OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection (CVE-2026-27485)
Details
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, skills/skill-creator/scripts/package_skill.py (a local helper script used when authors package skills) previously followed symlinks while building .skill archives. If an author runs this script on a crafted local skill directory containing symlinks to files outside the skill root, the resulting archive can include unintended file contents. If exploited, this vulnerability can lead to potential unintentional disclosure of local files from the packaging machine into a generated .skill artifact, but requires local execution of the packaging script on attacker-controlled skill contents. This issue has been fixed in version 2026.2.18.
References
- NVD entry
- https://github.com/openclaw/openclaw/security/advisories/GHSA-r6h2-5gqq-v5v6
- https://github.com/openclaw/openclaw/pull/20796
- https://github.com/openclaw/openclaw/commit/c275932aa4230fb7a8212fe1b9d2a18424874b3f
- https://github.com/openclaw/openclaw/commit/ee1d6427b544ccadd73e02b1630ea5c29ba9a9f0
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.19
- OpenClawCVEs repository
Affected or Relevant Artifacts
- Developer: openclaw
- Deployer: openclaw
- Artifact Details:
| Type | Name |
|---|---|
| System | openclaw |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CWE
| ID | Description |
|---|---|
| CWE-61 | CWE-61: UNIX Symbolic Link (Symlink) Following |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2026-02-21
- Version: 0.3.2
- AVID Entry