PT-2026-20960 · Openclaw · Openclaw

Simecek

·

Published

2026-02-17

·

Updated

2026-03-01

·

CVE-2026-26326

CVSS v4.0

5.3

Medium

AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions OpenClaw versions prior to 2026.2.14
Description The skills.status function could reveal sensitive information to clients with operator.read access. This occurred because the function returned raw resolved config values within configChecks for skill requires.config paths. Specifically, the configChecks[].value element in the requirements report could expose secrets, such as Discord bot tokens, if a skill required a broad configuration subtree. The function is accessible via operator.read, allowing clients with read-only access to obtain secrets without needing operator.admin or config.* permissions. The API endpoint involved is skills.status. The vulnerable parameter is requires.config.
Recommendations Upgrade to OpenClaw version 2026.2.14 or later. Rotate any Discord tokens that may have been exposed to read-scoped clients.

Exploit

Fix

Information Disclosure

Weakness Enumeration

Related Identifiers

CVE-2026-26326
GHSA-8MH7-PHF8-XGFM

Affected Products

Openclaw