{"data":{"id":"46fd48d5-c324-4cb6-8b56-3f4cd7f02812","title":"GHSA-782p-5fr5-7fj8: OpenClaw Affected by Remote Code Execution via System Prompt Injection in Slack Channel Descriptions","summary":"OpenClaw's Slack integration had a vulnerability where Slack channel descriptions could be injected into the AI model's system prompt (the instructions that tell the AI how to behave). This allowed attackers to use prompt injection (tricking an AI by hiding instructions in its input) to potentially trigger unintended actions or expose data if tool execution was enabled.","solution":"Upgrade to openclaw version 2026.2.3 or later. If you do not use the Slack integration, no action is required.","labels":["security"],"sourceUrl":"https://github.com/advisories/GHSA-782p-5fr5-7fj8","publishedAt":"2026-02-17T18:40:11.000Z","cveId":"CVE-2026-24764","cweIds":null,"cvssScore":null,"cvssSeverity":"low","severity":"low","attackType":["prompt_injection"],"issueType":"vulnerability","affectedPackages":["openclaw@< 2026.2.3 (fixed: 2026.2.3)"],"affectedVendors":[],"affectedVendorsRaw":["OpenClaw"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":"unknown","epssScore":0.0003,"patchAvailable":null,"disclosureDate":null,"capecIds":null,"crossRefCount":0,"attackSophistication":"trivial","impactType":["integrity","confidentiality"],"aiComponentTargeted":"api","llmSpecific":true,"classifierConfidence":0.92,"researchCategory":null,"atlasIds":null}}