PT-2026-31962 · Openclaw · Openclaw
Keensecuritylab
+1
·
Published
2026-04-10
·
Updated
2026-04-10
·
CVE-2026-35651
CVSS v3.1
4.3
Medium
| AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
OpenClaw versions 2026.2.13 through 2026.3.24 contain an ANSI escape sequence injection vulnerability in approval prompts that allows attackers to spoof terminal output. Untrusted tool metadata can carry ANSI control sequences into approval prompts and permission logs, enabling attackers to manipulate displayed information through malicious tool titles.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw