gitopenclaw.com/threats/cve-2026-30741
Prompt Injection / RCECVSS 8.1⚠ UNPATCHED

CVE-2026-30741

Prompt Injection Leading to Remote Code Execution

What this means in plain English

A specially crafted instruction hidden in web content or documents can hijack your AI agent and make it run arbitrary code on your machine. This is the 'indirect prompt injection' attack — the agent reads a malicious webpage, and that page secretly instructs the agent to do something dangerous.

Technical description

Insufficient validation of AI model responses allows crafted prompt injection payloads to escape the agent sandbox and execute arbitrary code on the host system.

Affected versions

< 0.14.0

Fixed in: 0.14.0

No patch available yet — see mitigations below

Details

CVE IDCVE-2026-30741
CVSS Score8.1 (HIGH)
CategoryPrompt Injection / RCE
Disclosed2026-03-02
StatusUnpatched

Are you affected?

1

Run `openclaw --version`

2

All versions below 0.14.0 are affected

3

This is unpatched — mitigation required

How to fix

1

Update when 0.14.0 is released

2

Disable web browsing skills until patched

3

Never run agents on untrusted content without isolation

4

Use GitOpenClaw Watch to monitor for suspicious behavior

Scan your skills for this vulnerability

Use GitOpenClaw to scan any skill, repo, or install command for patterns associated with CVE-2026-30741 and other known vulnerabilities. Free, no account required.

References

  • https://conscia.com/research/openclaw-prompt-injection-rce

Other OpenClaw CVEs