OpenClaw versions prior to 2026.2.23 contain an html injection vulnerability in the HTML session exporter that allows attackers to execute arbitrary javascript by injecting malicious mimeType values in image content blocks. Attackers can craft session entries with specially crafted mimeType attributes that break out of the img src data-URL context to achieve cross-site scripting when exported HTML is opened.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2ww6-868g-2c56 | OpenClaw Vulnerable to HTML injection via unvalidated image MIME type in data-URL interpolation |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.23 contain an html injection vulnerability in the HTML session exporter that allows attackers to execute arbitrary javascript by injecting malicious mimeType values in image content blocks. Attackers can craft session entries with specially crafted mimeType attributes that break out of the img src data-URL context to achieve cross-site scripting when exported HTML is opened. | |
| Title | OpenClaw < 2026.2.23 - HTML Injection via Unvalidated Image MIME Type in Data-URL Interpolation | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-19T22:07:13.887Z
Reserved: 2026-03-10T19:48:44.964Z
Link: CVE-2026-32040
No data.
Status : Received
Published: 2026-03-19T22:16:40.420
Modified: 2026-03-19T22:16:40.420
Link: CVE-2026-32040
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA