OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error messages and stack traces (for example, when request URLs include `https://api.telegram.org/bot<token>/...`). Prior to version 2026.2.15, OpenClaw logged these strings without redaction, which could leak the bot token into logs, crash reports, CI output, or support bundles. Disclosure of a Telegram bot token allows an attacker to impersonate the bot and take over Bot API access. Users should upgrade to version 2026.2.15 to obtain a fix and rotate the Telegram bot token if it may have been exposed.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/cf69907015b659e5025efb735ee31bd05c4ee3d5 | Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-chf7-jq6g-qrwv | Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2026-02-20 00:16
Updated : 2026-02-20 18:06
NVD link : CVE-2026-27003
Mitre link : CVE-2026-27003
CVE.ORG link : CVE-2026-27003
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-522
Insufficiently Protected Credentials
