OpenClaw 2026.2.12 Released to Patch Over 40 Security Vulnerabilities


The OpenClaw team has officially released version 2026.2.12, a comprehensive update focused heavily on security hardening and architectural stability.

This release addresses over 40 security vulnerabilities and stability issues, marking a significant milestone for the AI agent framework.

The update arrives just five hours after the initial code merge, underscoring the urgency of these patches.

Critical improvements span across the gateway, sandbox isolation, and multiple integration providers including WhatsApp, Discord, and Slack.

Critical Security Hardening and SSRF Protections

One of the most severe issues addressed in this release involves Server-Side Request Forgery (SSRF) risks within the gateway’s URL handling.

The development team has hardened the input_file and input_image parameters by implementing an explicit deny policy and hostname allowlists.

ComponentVulnerability TypeDescriptionAttribution
GatewaySSRFHardened URL handling with explicit deny policy and hostname allowlists.Internal
HooksMalicious CodeRemoval of the bundled soul-evil hook component.@Imccccc
APIAuth BypassFix for unauthenticated Nostr profile API remote config tampering.@coygeek
SandboxPath TraversalConfined skill sync destinations to prevent filesystem escapes.@1seal
Web ToolsPrompt InjectionStripped toolResult.details to reduce replay attack surface.Internal
BlueBubblesAuth BypassFixed webhook authentication bypass via loopback proxy trust.@coygeek

This change prevents attackers from manipulating the agent to access internal network resources.

Additionally, the update introduces a strict per-request URL input cap to mitigate potential denial-of-service vectors.

The engineering team also removed a bundled hook identified as soul-evil (PR #14757), eliminating a potential backdoor or malicious component that had inadvertently remained in the codebase.

Another significant patch targets an unauthenticated remote configuration tampering vulnerability in the Nostr profile API (PR #13719), which could have allowed unauthorized actors to modify agent settings remotely.

To further secure the agent’s runtime environment, OpenClaw 2026.2.12 refines how skills are synchronized and executed.

IntegrationKey UpdateSecurity/Stability Impact
WhatsAppMIME Type DefaultsEnsures voice messages are handled correctly when types are omitted.
SlackCommand DetectionDetects control commands even when prefixed with bot mentions.
SignalInput ValidationEnforces E.164 validation to catch mistyped numbers early.

The system now strictly limits mirrored skill destinations to the skills/ root directory, preventing directory traversal attacks that previously attempted to use frontmatter-controlled names to escape the sandbox.

Browser and web content handling has also been shifted to an “untrusted by default” model. The system now strips detailed tool results from the inputs sent back to the language model during transcript compaction.

This reduces the risk of prompt injection replay attacks, where malicious web content could manipulate the agent’s future behavior by injecting hidden instructions into the context window.

This release introduces a necessary breaking change to the POST /hooks/agent endpoint. By default, the system now rejects payload sessionKey overrides to prevent session hijacking.

Administrators who require the legacy behavior must now explicitly configure hooks.allowRequestSessionKey: true, though the team recommends using fixed hook contexts instead.

Authentication for browser control has also been strengthened. The system now requires authentication for loopback browser control routes and will auto-generate an auth token if one is missing during startup.

This prevents local attackers from hijacking the browser control interface without credentials.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google



Source link