Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30741: n/a

0
Critical
VulnerabilityCVE-2026-30741cvecve-2026-30741
Published: Wed Mar 11 2026 (03/11/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6 allows attackers to execute arbitrary code via a Request-Side prompt injection attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 19:12:43 UTC

Technical Analysis

CVE-2026-30741 is a severe remote code execution (RCE) vulnerability identified in the OpenClaw Agent Platform version 2026.2.6. The vulnerability arises from a request-side prompt injection attack, where an attacker can inject malicious input that is improperly sanitized or validated by the platform, leading to arbitrary code execution on the host system. This vulnerability is classified under CWE-94, which relates to code injection flaws. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable remotely. The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H), allowing attackers to fully control affected systems. Despite the critical severity and high CVSS score of 9.8, no public exploits or patches are currently available, indicating a zero-day window. The OpenClaw Agent Platform is typically deployed in enterprise environments for agent-based monitoring or management, making this vulnerability a significant risk for organizations relying on it. The lack of version specifics beyond 2026.2.6 suggests all instances of this release are vulnerable. The vulnerability's exploitation could lead to complete system compromise, data theft, disruption of services, or use of the platform as a pivot point for further network attacks.

Potential Impact

The impact of CVE-2026-30741 is critical for organizations worldwide using the OpenClaw Agent Platform. Successful exploitation allows attackers to execute arbitrary code remotely without authentication or user interaction, leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical services, deployment of ransomware or malware, and lateral movement within networks. Enterprises relying on this platform for monitoring or management could see operational outages, data breaches, and reputational damage. The vulnerability's ease of exploitation and high severity increase the risk of rapid weaponization by threat actors. Given the platform's role, attacks could affect sectors such as finance, healthcare, government, and critical infrastructure, where uptime and data integrity are paramount. The absence of patches or mitigations at the time of disclosure exacerbates the threat, requiring immediate defensive actions to prevent exploitation.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict network access to the OpenClaw Agent Platform instances by applying strict firewall rules and network segmentation to limit exposure to untrusted networks. 2) Monitor network traffic and logs for unusual or suspicious request patterns indicative of injection attempts targeting the platform. 3) Employ Web Application Firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block prompt injection payloads. 4) Disable or limit unnecessary functionalities or interfaces of the OpenClaw Agent Platform that could be exploited. 5) Conduct thorough inventory and asset management to identify all instances of the vulnerable version for prioritized protection. 6) Prepare incident response plans specific to RCE attacks on this platform, including containment and recovery procedures. 7) Engage with the vendor for timely updates and patches, and apply them immediately upon availability. 8) Educate security teams about the nature of prompt injection attacks to improve detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b194fa2f860ef94334246c

Added to database: 3/11/2026, 4:14:50 PM

Last enriched: 3/18/2026, 7:12:43 PM

Last updated: 4/25/2026, 10:10:12 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses