Summary
The IronClaw audit log viewer rendered tool call arguments without HTML escaping. A malicious tool call could inject script tags that executed in the context of an authenticated admin viewing the log.
Details
| CVE ID | CVE-2026-24112 |
| Severity | medium (6.1) |
| CVSS vector | AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
| Published | 2026-04-08 |
| Patched | 2026-04-12 |
| Affected versions | 1.0.0 – 1.1.4 |
| Fixed in | 1.1.5 |
| Exploited in the wild | no known exploitation |
Affected projects
What to do
- If you run an affected version: upgrade to
1.1.5immediately. Do not delay this for convenience reasons. - Rotate any credentials that may have been exposed via the affected component.
- Audit your logs for indicators of exploitation — unexpected outbound traffic, anomalous tool calls, unfamiliar authenticated sessions.
- If exploitation is confirmed, treat the host as compromised: rebuild from a clean image, rotate every secret on the host, audit lateral movement.
Sources
- NIST NVD: CVE-2026-24112 on NVD
See also: all CVEs, tracked agents, methodology.