Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. CVE-2026-27486

CVE-2026-27486: OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup

February 18, 2026 (updated February 23, 2026)

OpenClaw CLI process cleanup used system-wide process enumeration and pattern matching to terminate processes without verifying they were owned by the current OpenClaw process. On shared hosts, unrelated processes could be terminated if they matched the pattern.

References

  • github.com/advisories/GHSA-jfv4-h8mc-jcp8
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/commit/6084d13b956119e3cf95daaf9a1cae1670ea3557
  • github.com/openclaw/openclaw/commit/eb60e2e1b213740c3c587a7ba4dbf10da620ca66
  • github.com/openclaw/openclaw/releases/tag/v2026.2.14
  • github.com/openclaw/openclaw/security/advisories/GHSA-jfv4-h8mc-jcp8
  • nvd.nist.gov/vuln/detail/CVE-2026-27486

Code Behaviors & Features

Detect and mitigate CVE-2026-27486 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.2.14

Fixed versions

  • 2026.2.14

Solution

Upgrade to version 2026.2.14 or above.

Impact 5.5 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-283: Unverified Ownership

Source file

npm/openclaw/CVE-2026-27486.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:18:45 +0000.