CVE-2026-26327
February 19, 2026
OpenClaw is a personal AI assistant. Discovery beacons (Bonjour/mDNS and DNS-SD) include TXT records such as "lanHost", "tailnetDns", "gatewayPort", and "gatewayTlsSha256". TXT records are unauthenticated. Prior to version 2026.2.14, some clients treated TXT values as authoritative routing/pinning inputs. iOS and macOS used TXT-provided host hints ("lanHost"/"tailnetDns") and ports ("gatewayPort") to build the connection URL. iOS and Android allowed the discovery-provided TLS fingerprint ("gatewayTlsSha256") to override a previously stored TLS pin. On a shared/untrusted LAN, an attacker could advertise a rogue "_openclaw-gw._tcp" service. This could cause a client to connect to an attacker-controlled endpoint and/or accept an attacker certificate, potentially exfiltrating Gateway credentials ("auth.token" / "auth.password") during connection. As of time of publication, the iOS and Android apps are alpha/not broadly shipped (no public App Store / Play Store release). Practical impact is primarily limited to developers/testers running those builds, plus any other shipped clients relying on discovery on a shared/untrusted LAN. Version 2026.2.14 fixes the issue. Clients now prefer the resolved service endpoint (SRV + A/AAAA) over TXT-provided routing hints. Discovery-provided fingerprints no longer override stored TLS pins. In iOS/Android, first-time TLS pins require explicit user confirmation (fingerprint shown; no silent TOFU) and discovery-based direct connects are TLS-only. In Android, hostname verification is no longer globally disabled (only bypassed when pinning).
Affected Packages
https://github.com/openclaw/openclaw.git (GITHUB):
Affected version(s) >=v2026.1.5-1 <v2026.2.14Fix Suggestion:
Update to version v2026.2.14openclaw (NPM):
Affected version(s) >=0.0.1 <2026.2.14Fix Suggestion:
Update to version 2026.2.14Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
5.7
Attack Vector
ADJACENT
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
Exploit Maturity
NOT DEFINED
CVSS v3
Base Score:
6.5
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Insufficient Verification of Data Authenticity
EPSS
Base Score:
0.01