critical · CVSS 9.1exploited in wildpatched

CVE-2026-25103

OpenClaw — credential storage in plaintext on disk

Timeline
Disclosed2026-02-04Exploit observed2026-02-06Patch available2026-02-08Patched2026-05-03

Each rust dot is a disclosed event in this advisory's life: when it was published, when (if ever) a patch shipped, when exploitation was observed in the wild, and where things stand today (the dashed line). Ghosted dots are events that haven't happened yet.

Summary

OpenClaw stored API keys for LLM providers in plaintext in ~/.openclaw/credentials.json with mode 644. Any process running under the same user could read the file. The pre-2026.2.10 default tools included an unrestricted file-read tool, making prompt-injection-driven credential exfiltration trivial.

Details

CVE IDCVE-2026-25103
Severitycritical (9.1)
CVSS vectorAV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Published2026-02-04
Patched2026-02-08
Affected versions≤ 2026.2.9
Fixed in2026.2.10 (with manual key rotation required)
Exploited in the wildyes

Affected AI agents

OpenClaw
Are you running OpenClaw?Paste your docker-compose.yml or requirements.txt and we'll tell you in 10 seconds whether CVE-2026-25103 hits your stack.
Scan my AI stack →

What to do

  • If you run an affected version: upgrade to 2026.2.10 (with manual key rotation required) immediately. Do not delay this for convenience reasons.
  • Rotate any credentials that may have been exposed via the affected component.
  • Audit your logs for indicators of exploitation — unexpected outbound traffic, anomalous tool calls, unfamiliar authenticated sessions.
  • If exploitation is confirmed, treat the host as compromised: rebuild from a clean image, rotate every secret on the host, audit lateral movement.

Sources

Are you affected?

Type the version you have installed. We check it against ≤ 2026.2.9.

This is a best-effort check. When in doubt, upgrade to 2026.2.10 (with manual key rotation required).

Related AI CVEs

See also: all AI CVEs, AI agents tracker, scan your AI stack, Pro alerts, methodology.