OpenClaw versions prior to 2026.2.23 contain an html injection vulnerability in the HTML session exporter that allows attackers to execute arbitrary javascript by injecting malicious mimeType values in image content blocks. Attackers can craft session entries with specially crafted mimeType attributes that break out of the img src data-URL context to achieve cross-site scripting when exported HTML is opened.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/pull/24140 | Issue Tracking |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-2ww6-868g-2c56 | Vendor Advisory Exploit |
| https://www.vulncheck.com/advisories/openclaw-html-injection-via-unvalidated-image-mime-type-in-data-url-interpolation | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-19 22:16
Updated : 2026-03-23 17:28
NVD link : CVE-2026-32040
Mitre link : CVE-2026-32040
CVE.ORG link : CVE-2026-32040
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
