CVE-2026-27576
📋 TL;DR
OpenClaw's ACP bridge accepts excessively large prompt text blocks, allowing local ACP clients to send oversized payloads that could cause resource exhaustion or denial of service. This primarily affects local integrations like IDE plugins that send unusually large inputs. The vulnerability is limited to local stdio communication between ACP clients and the chat.send function.
💻 Affected Systems
- OpenClaw
📦 What is this software?
Openclaw by Openclaw
⚠️ Risk & Real-World Impact
Worst Case
Resource exhaustion leading to denial of service, potentially crashing the OpenClaw process or causing system instability through memory/CPU exhaustion.
Likely Case
Local denial of service affecting OpenClaw functionality when IDE integrations or other ACP clients send malformed large inputs.
If Mitigated
Minimal impact with proper input validation and size limits in place.
🎯 Exploit Status
Exploitation requires local access to send inputs via ACP bridge, typically through IDE integrations or custom ACP clients.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2026.2.19
Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-cxpw-2g23-2vgw
Restart Required: Yes
Instructions:
1. Download OpenClaw v2026.2.19 from official releases. 2. Stop OpenClaw service. 3. Replace existing installation with patched version. 4. Restart OpenClaw service.
🔧 Temporary Workarounds
Input Size Limitation
allConfigure ACP clients to limit prompt text size before sending to OpenClaw.
# Configure your IDE plugin or ACP client to limit input size
Disable ACP Bridge
allTemporarily disable ACP bridge functionality if not required.
# Set environment variable: OPENCLAW_ACP_DISABLE=1
# Or modify config to disable ACP bridge
🧯 If You Can't Patch
- Monitor system resources for unusual memory/CPU usage by OpenClaw processes.
- Implement rate limiting or input validation in ACP client applications.
🔍 How to Verify
Check if Vulnerable:
Check OpenClaw version: if version is 2026.2.17 or earlier, system is vulnerable.
Check Version:
openclaw --version
Verify Fix Applied:
Verify OpenClaw version is 2026.2.19 or later after patching.
📡 Detection & Monitoring
Log Indicators:
- Large input size warnings in OpenClaw logs
- Resource exhaustion errors
- ACP bridge processing errors
Network Indicators:
- N/A - Local stdio communication only
SIEM Query:
source="openclaw.log" AND ("large input" OR "resource" OR "memory" OR "ACP")
🔗 References
- https://github.com/openclaw/openclaw/commit/63e39d7f57ac4ad4a5e38d17e7394ae7c4dd0b9c
- https://github.com/openclaw/openclaw/commit/8ae2d5110f6ceadef73822aa3db194fb60d2ba68
- https://github.com/openclaw/openclaw/commit/ebcf19746f5c500a41817e03abecadea8655654a
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.19
- https://github.com/openclaw/openclaw/security/advisories/GHSA-cxpw-2g23-2vgw