CVE-2026-30741

CRITICAL

OpenClaw Agent Platform 2026.2.6 - RCE

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 2 public exploits for CVE-2026-30741. PoCs published by Named1ess.

AI-analyzed exploit summary The repository contains a functional PoC for CVE-2026-30741, demonstrating Remote Code Execution (RCE) via Request-Side Prompt Injection in OpenClaw Agent Platform. The exploit manipulates API requests to inject malicious prompts, leading to unauthorized command execution.

Description

A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6 allows attackers to execute arbitrary code via a Request-Side prompt injection attack.

Exploits (2)

nomisec WORKING POC 4 stars
by Named1ess · poc
https://github.com/Named1ess/CVE-2026-30741

The repository contains a functional PoC for CVE-2026-30741, demonstrating Remote Code Execution (RCE) via Request-Side Prompt Injection in OpenClaw Agent Platform. The exploit manipulates API requests to inject malicious prompts, leading to unauthorized command execution.

Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target: OpenClaw Agent Platform v2026.2.6 and earlier
No auth needed
Prerequisites: Access to the target API endpoint · Ability to intercept/modify API requests
devstral-2 · analyzed May 04, 2026 Full analysis →
gitlab WORKING POC
by Named1ess · poc
https://gitlab.com/Named1ess/CVE-2026-30741

The repository contains a functional proof-of-concept exploit for CVE-2026-30741, demonstrating remote code execution via request-side prompt injection in the OpenClaw Agent Platform. The exploit manipulates API requests to inject malicious prompts, leading to unauthorized command execution.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target: OpenClaw Agent Platform v2026.2.6 and earlier
No auth needed
Prerequisites: Access to the target API endpoint · Ability to intercept/modify API requests
devstral-2 · analyzed Apr 09, 2026 Full analysis →

References (3)

Core 3
Core References
Exploit, Third Party Advisory
https://github.com/Named1ess/CVE-2026-30741

Scores

CVSS v3 9.8
EPSS 0.0045
EPSS Percentile 64.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-94
Status published
Products (1)
openclaw/openclaw < 2026.2.6
Published Mar 11, 2026
Tracked Since Mar 11, 2026