CVE-2026-27524
MEDIUMOpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path
Title source: cnaDescription
OpenClaw versions prior to 2026.2.21 accept prototype-reserved keys in runtime /debug set override object values, allowing prototype pollution attacks. Authorized /debug set callers can inject __proto__, constructor, or prototype keys to manipulate object prototypes and bypass command gate restrictions.
References (3)
Core 3
Core References
Third Party Advisory third-party-advisory
GitHub Security Advisory (GHSA-62f6-mrcj-v8h5)
https://github.com/openclaw/openclaw/security/advisories/GHSA-62f6-mrcj-v8h5
Patch patch
Patch Commit
https://github.com/openclaw/openclaw/commit/fbb79d4013000552d6a2c23b9613d8b3cb92f6b6
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path
https://www.vulncheck.com/advisories/openclaw-prototype-pollution-via-debug-override-path
Scores
CVSS v3
4.3
EPSS
0.0004
EPSS Percentile
13.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-1321
Status
published
Products (3)
npm/openclaw
0 - 2026.2.21npm
OpenClaw/OpenClaw
< 2026.2.21
openclaw/openclaw
< 2026.2.21
Published
Mar 18, 2026
Tracked Since
Mar 18, 2026