安全漏洞追踪面板 — 基于 cvelistV5 + GitHub Advisory Database 数据
| CVE ID | 严重性 | CVSS | 漏洞描述 | 发布日期 |
|---|---|---|---|---|
| CVE-2026-24763 | 🔴 HIGH | 8.8 | OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable | 2026-02-02 |
| CVE-2026-25253 | 🔴 HIGH | 8.8 | OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl | 2026-02-01 |
| CVE-2026-28478 | 🔴 HIGH | 8.7 | OpenClaw affected by denial of service via unbounded webhook request body buffering | 2026-03-05 |
| CVE-2026-33577 | 🔴 HIGH | 8.6 | OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve | 2026-03-31 |
| CVE-2026-33579 | 🔴 HIGH | 8.6 | OpenClaw: /pair approve command path omitted caller scope subsetting and reopened device pairing escalation | 2026-03-31 |
| CVE-2026-34503 | 🔴 HIGH | 8.6 | OpenClaw's device removal and token revocation do not terminate active WebSocket sessions | 2026-03-31 |
| CVE-2026-28469 | 🔴 HIGH | 8.2 | OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting | 2026-03-05 |
| CVE-2026-25157 | 🔴 HIGH | 7.8 | OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand | 2026-02-04 |
| CVE-2026-28458 | 🔴 HIGH | 7.4 | OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access | 2026-03-05 |
| CVE-2026-26317 | 🔴 HIGH | 7.1 | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | 2026-02-19 |
| CVE-2026-33581 | 🔴 HIGH | 7.1 | OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters | 2026-03-31 |
| CVE-2026-28480 | 🟡 MEDIUM | 6.9 | OpenClaw Telegram allowlist authorization accepted mutable usernames | 2026-03-05 |
| CVE-2026-33576 | 🟡 MEDIUM | 6.9 | OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel | 2026-03-31 |
| CVE-2026-34504 | 🟡 MEDIUM | 6.9 | OpenClaw affected by SSRF via unguarded image download in fal provider | 2026-03-31 |
| CVE-2026-29612 | 🟡 MEDIUM | 6.8 | OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding | 2026-03-05 |
| CVE-2026-28452 | 🟡 MEDIUM | 6.7 | OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) | 2026-03-05 |
| CVE-2026-26328 | 🟡 MEDIUM | 6.5 | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities | 2026-02-19 |
| CVE-2026-33580 | 🟡 MEDIUM | 6.3 | OpenClaw's Nextcloud Talk webhook missing rate limiting on shared secret authentication | 2026-03-31 |
| CVE-2026-33578 | 🟡 MEDIUM | 5.3 | OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade | 2026-03-31 |
| CVE-2026-34425 | 🟡 MEDIUM | 5.3 | OpenClaw - Shell-Bleed Protection Preflight Validation Bypass | 2026-04-02 |
| CVE ID | 状态 | CNA | GHSA 发布日期 | cvelistV5 |
|---|---|---|---|---|
| CVE-2026-24763 | ✅ PUBLISHED | GitHub_M | 2026-02-02 | ✅ 已收录 |
| CVE-2026-25157 | ✅ PUBLISHED | GitHub_M | 2026-02-02 | ✅ 已收录 |
| CVE-2026-25253 | ✅ PUBLISHED | mitre | 2026-02-02 | ✅ 已收录 |
| CVE-2026-26317 | ✅ PUBLISHED | GitHub_M | 2026-02-18 | ✅ 已收录 |
| CVE-2026-26328 | ✅ PUBLISHED | GitHub_M | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28452 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28458 | ✅ PUBLISHED | VulnCheck | 2026-02-17 | ✅ 已收录 |
| CVE-2026-28469 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28478 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28480 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-29612 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-33576 | ✅ PUBLISHED | VulnCheck | 2026-03-31 | ✅ 已收录 |
| CVE-2026-33577 | ✅ PUBLISHED | VulnCheck | 2026-04-01 | ✅ 已收录 |
| CVE-2026-33578 | ✅ PUBLISHED | VulnCheck | 2026-04-01 | ✅ 已收录 |
| CVE-2026-33579 | ✅ PUBLISHED | VulnCheck | 2026-03-31 | ✅ 已收录 |
| CVE-2026-33580 | ✅ PUBLISHED | VulnCheck | 2026-03-31 | ✅ 已收录 |
| CVE-2026-33581 | ✅ PUBLISHED | VulnCheck | 2026-03-31 | ✅ 已收录 |
| CVE-2026-34425 | ✅ PUBLISHED | VulnCheck | 2026-04-06 | ✅ 已收录 |
| CVE-2026-34503 | ✅ PUBLISHED | VulnCheck | 2026-03-31 | ✅ 已收录 |
| CVE-2026-34504 | ✅ PUBLISHED | VulnCheck | 2026-04-01 | ✅ 已收录 |
| CVE-2026-33581 | ✅ PUBLISHED | | [GHSA-2pr2-hcv6-7gwv](https://github.com/advisories/GHSA-2pr2-hcv6-7gwv) | 2026-03-31 | ✅ 已收录 |
| CVE-2026-33579 | ✅ PUBLISHED | | [GHSA-6pfc-6m7w-m8fx](https://github.com/advisories/GHSA-6pfc-6m7w-m8fx) | 2026-03-31 | ✅ 已收录 |
| CVE-2026-28469 | ✅ PUBLISHED | | [GHSA-3fqr-4cg8-h96q](https://github.com/advisories/GHSA-3fqr-4cg8-h96q) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28478 | ✅ PUBLISHED | | [GHSA-mr32-vwc2-5j6h](https://github.com/advisories/GHSA-mr32-vwc2-5j6h) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-25157 | ✅ PUBLISHED | | [GHSA-g8p2-7wf7-98mq](https://github.com/advisories/GHSA-g8p2-7wf7-98mq) | 2026-02-02 | ✅ 已收录 |
| CVE-2026-24763 | ✅ PUBLISHED | | [GHSA-r2c6-8jc8-g32w](https://github.com/advisories/GHSA-r2c6-8jc8-g32w) | 2026-02-02 | ✅ 已收录 |
| CVE-2026-34425 | ✅ PUBLISHED | | [GHSA-6336-qqw9-v6x6](https://github.com/advisories/GHSA-6336-qqw9-v6x6) | 2026-04-06 | ✅ 已收录 |
| CVE-2026-33578 | ✅ PUBLISHED | | [GHSA-2x4x-cc5g-qmmg](https://github.com/advisories/GHSA-2x4x-cc5g-qmmg) | 2026-04-01 | ✅ 已收录 |
| CVE-2026-33580 | ✅ PUBLISHED | | [GHSA-v2v2-f783-358j](https://github.com/advisories/GHSA-v2v2-f783-358j) | 2026-03-31 | ✅ 已收录 |
| CVE-2026-28480 | ✅ PUBLISHED | | [GHSA-h89v-j3x9-8wqj](https://github.com/advisories/GHSA-h89v-j3x9-8wqj) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-29612 | ✅ PUBLISHED | | [GHSA-g34w-4xqq-h79m](https://github.com/advisories/GHSA-g34w-4xqq-h79m) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-34504 | ✅ PUBLISHED | | [GHSA-g86v-f9qv-rh6m](https://github.com/advisories/GHSA-g86v-f9qv-rh6m) | 2026-04-01 | ✅ 已收录 |