CVE-2026-27003
Received Received - Intake
Sensitive Token Exposure in OpenClaw Logs Enables Bot Takeover

Publication date: 2026-02-20

Last updated on: 2026-02-20

Assigner: GitHub, Inc.

Description
OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error messages and stack traces (for example, when request URLs include `https://api.telegram.org/bot<token>/...`). Prior to version 2026.2.15, OpenClaw logged these strings without redaction, which could leak the bot token into logs, crash reports, CI output, or support bundles. Disclosure of a Telegram bot token allows an attacker to impersonate the bot and take over Bot API access. Users should upgrade to version 2026.2.15 to obtain a fix and rotate the Telegram bot token if it may have been exposed.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-02-20
Generated
2026-05-07
AI Q&A
2026-02-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.15 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the OpenClaw personal AI assistant, specifically versions up to 2026.2.14. When OpenClaw processes request URLs containing Telegram bot tokens in the format https://api.telegram.org/bot<token>/..., it logged these tokens in error messages, stack traces, crash reports, CI outputs, or support bundles without redacting them.

Because these tokens are sensitive credentials, their exposure in logs or error outputs can lead to unauthorized access. An attacker who obtains a Telegram bot token can impersonate the bot and take over its Bot API access.

The vulnerability was fixed in version 2026.2.15 by implementing redaction of Telegram bot tokens from error messages and stack traces to prevent accidental leakage.


How can this vulnerability impact me? :

If your Telegram bot token is exposed due to this vulnerability, an attacker can impersonate your bot by using the leaked token.

This unauthorized access allows the attacker to control the bot, potentially sending messages, accessing data, or performing actions on behalf of the bot.

Such a compromise can lead to loss of trust, unauthorized data access, and disruption of services that rely on the bot.

To mitigate this risk, users should upgrade to OpenClaw version 2026.2.15 or later and rotate any Telegram bot tokens that may have been exposed.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by searching your logs, error messages, stack traces, crash reports, CI outputs, or support bundles for exposed Telegram bot tokens. These tokens appear in URLs in the format https://api.telegram.org/bot<token>/..., where <token> is a numeric ID followed by a colon and a 20+ character alphanumeric string.'}, {'type': 'paragraph', 'content': 'You can use commands to search for these tokens in your log files or outputs. For example, using grep on Linux or Unix systems:'}, {'type': 'list_item', 'content': "grep -rE 'bot[0-9]{6,}:[A-Za-z0-9_-]{20,}' /path/to/logs"}, {'type': 'list_item', 'content': 'This command recursively searches files in the specified directory for strings matching the Telegram bot token pattern.'}, {'type': 'paragraph', 'content': 'Additionally, monitoring error messages or stack traces that include URLs with the bot token pattern can help detect exposure.'}] [1, 2]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade OpenClaw to version 2026.2.15 or later, which includes a fix that redacts Telegram bot tokens from error messages and stack traces to prevent leakage.

If you suspect that your Telegram bot token has been exposed in logs or error outputs, you should rotate the Telegram bot token to invalidate the compromised token and prevent unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart