We use cookies to improve your experience on our site.
AVID-2026-R0247
Description
OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs (CVE-2026-27576)
Details
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very large prompt text blocks and can assemble oversized prompt payloads before forwarding them to chat.send. Because ACP runs over local stdio, this mainly affects local ACP clients (for example IDE integrations) that send unusually large inputs. This issue has been fixed in version 2026.2.19.
References
- NVD entry
- https://github.com/openclaw/openclaw/security/advisories/GHSA-cxpw-2g23-2vgw
- https://github.com/openclaw/openclaw/commit/63e39d7f57ac4ad4a5e38d17e7394ae7c4dd0b9c
- https://github.com/openclaw/openclaw/commit/8ae2d5110f6ceadef73822aa3db194fb60d2ba68
- https://github.com/openclaw/openclaw/commit/ebcf19746f5c500a41817e03abecadea8655654a
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.19
- OpenClawCVEs repository
Affected or Relevant Artifacts
- Developer: openclaw
- Deployer: openclaw
- Artifact Details:
| Type | Name |
|---|---|
| System | openclaw |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CWE
| ID | Description |
|---|---|
| CWE-400 | CWE-400: Uncontrolled Resource Consumption |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2026-02-21
- Version: 0.3
- AVID Entry