CVE-2026-27524

MEDIUM

OpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path

Title source: cna
STIX 2.1

Description

OpenClaw versions prior to 2026.2.21 accept prototype-reserved keys in runtime /debug set override object values, allowing prototype pollution attacks. Authorized /debug set callers can inject __proto__, constructor, or prototype keys to manipulate object prototypes and bypass command gate restrictions.

References (3)

Core 3
Core References
Third Party Advisory third-party-advisory
GitHub Security Advisory (GHSA-62f6-mrcj-v8h5)
https://github.com/openclaw/openclaw/security/advisories/GHSA-62f6-mrcj-v8h5
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path
https://www.vulncheck.com/advisories/openclaw-prototype-pollution-via-debug-override-path

Scores

CVSS v3 4.3
EPSS 0.0004
EPSS Percentile 13.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-1321
Status published
Products (3)
npm/openclaw 0 - 2026.2.21npm
OpenClaw/OpenClaw < 2026.2.21
openclaw/openclaw < 2026.2.21
Published Mar 18, 2026
Tracked Since Mar 18, 2026