Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g55j-c2v4-pjcg | OpenClaw vulnerable to Unauthenticated Local RCE via WebSocket config.apply |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Vendors & Products |
Openclaw
Openclaw openclaw |
Fri, 06 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling command injection as the gateway user. This vulnerability is fixed in 2026.1.20. | |
| Title | OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply | |
| Weaknesses | CWE-306 CWE-78 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-09T15:27:48.829Z
Reserved: 2026-02-03T01:02:46.716Z
Link: CVE-2026-25593
Updated: 2026-02-09T15:20:46.234Z
Status : Awaiting Analysis
Published: 2026-02-06T21:16:17.790
Modified: 2026-02-06T21:57:22.450
Link: CVE-2026-25593
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:49:52Z
Github GHSA