Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. CVE-2026-26320

CVE-2026-26320: OpenClaw macOS deep link confirmation truncation can conceal executed agent message

February 17, 2026 (updated February 20, 2026)

OpenClaw macOS desktop client registers the openclaw:// URL scheme. For openclaw://agent deep links without an unattended key, the app shows a confirmation dialog that previously displayed only the first 240 characters of the message, but executed the full message after the user clicked “Run”.

At the time of writing, the OpenClaw macOS desktop client is still in beta.

An attacker could pad the message with whitespace to push a malicious payload outside the visible preview, increasing the chance a user approves a different message than the one that is actually executed.

References

  • github.com/advisories/GHSA-7q2j-c4q5-rm27
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/commit/28d9dd7a772501ccc3f71457b4adfee79084fe6f
  • github.com/openclaw/openclaw/releases/tag/v2026.2.14
  • github.com/openclaw/openclaw/security/advisories/GHSA-7q2j-c4q5-rm27
  • nvd.nist.gov/vuln/detail/CVE-2026-26320

Code Behaviors & Features

Detect and mitigate CVE-2026-26320 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2026.2.6-0 before 2026.2.14

Fixed versions

  • 2026.2.14

Solution

Upgrade to version 2026.2.14 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-451: User Interface (UI) Misrepresentation of Critical Information

Source file

npm/openclaw/CVE-2026-26320.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:19:16 +0000.