gitopenclaw.com/threats/cve-2026-31204
Information DisclosureCVSS 6.8Patched

CVE-2026-31204

Information Disclosure via Debug Mode Default

What this means in plain English

If you installed OpenClaw using certain common methods, it may be logging every conversation your AI agents have — including sensitive instructions, API responses, and potentially credentials — in plain text to a log file any application on your machine can read.

Technical description

OpenClaw defaults to debug mode in certain installation scenarios, exposing full session logs including agent instructions and responses to any process reading the log file.

Affected versions

All versions when installed via some package managers

Fixed in: 0.13.3

Details

CVE IDCVE-2026-31204
CVSS Score6.8 (MEDIUM)
CategoryInformation Disclosure
Disclosed2026-03-18
StatusPatched

Are you affected?

1

Run `openclaw config show | grep debug`

2

If debug is enabled, you may be affected

3

Check ~/.openclaw/logs/ for unexpected log files

How to fix

1

Run `openclaw config set debug false`

2

Delete any existing debug logs from ~/.openclaw/logs/

3

Update to 0.13.3: `npm update -g openclaw`

Scan your skills for this vulnerability

Use GitOpenClaw to scan any skill, repo, or install command for patterns associated with CVE-2026-31204 and other known vulnerabilities. Free, no account required.

References

  • https://koi.security/research/openclaw-debug-disclosure

Other OpenClaw CVEs