安全漏洞追踪面板 — 基于 cvelistV5 + GitHub Advisory Database 数据
| CVE ID | 严重性 | CVSS | 漏洞描述 | 发布日期 |
|---|---|---|---|---|
| CVE-2026-43534 | 🟣 CRITICAL | 9.3 | OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events | 2026-05-05 |
| CVE-2026-43566 | 🟣 CRITICAL | 9.1 | OpenClaw: Heartbeat owner downgrade missed untrusted webhook wake events | 2026-05-05 |
| CVE-2026-43533 | 🔴 HIGH | 8.9 | OpenClaw < 2026.4.10 - Arbitrary Local File Read via QQBot Media Tags | 2026-05-05 |
| CVE-2026-25253 | 🔴 HIGH | 8.8 | OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl | 2026-02-01 |
| CVE-2026-24763 | 🔴 HIGH | 8.8 | OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable | 2026-02-02 |
| CVE-2026-28478 | 🔴 HIGH | 8.7 | OpenClaw affected by denial of service via unbounded webhook request body buffering | 2026-03-05 |
| CVE-2026-42435 | 🔴 HIGH | 8.7 | OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms | 2026-05-05 |
| CVE-2026-42434 | 🔴 HIGH | 8.7 | OpenClaw: Sandboxed agents could escape exec routing via host=node override | 2026-05-05 |
| CVE-2026-43530 | 🔴 HIGH | 8.7 | OpenClaw: busybox and toybox applet execution weakened exec approval binding | 2026-05-05 |
| CVE-2026-43526 | 🔴 HIGH | 8.3 | OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes | 2026-05-05 |
| CVE-2026-28469 | 🔴 HIGH | 8.2 | OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting | 2026-03-05 |
| CVE-2026-42437 | 🔴 HIGH | 8.2 | OpenClaw: Voice-call realtime WebSocket accepted oversized frames | 2026-05-05 |
| CVE-2026-25157 | 🔴 HIGH | 7.8 | OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand | 2026-02-04 |
| CVE-2026-43571 | 🔴 HIGH | 7.7 | OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows | 2026-05-05 |
| CVE-2026-43569 | 🔴 HIGH | 7.7 | OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins | 2026-05-05 |
| CVE-2026-43535 | 🔴 HIGH | 7.6 | OpenClaw < 2026.4.14 - Authorization Context Reuse in Collect-Mode Queue Batches | 2026-05-05 |
| CVE-2026-28458 | 🔴 HIGH | 7.4 | OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access | 2026-03-05 |
| CVE-2026-26317 | 🔴 HIGH | 7.1 | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | 2026-02-19 |
| CVE-2026-42433 | 🔴 HIGH | 7.1 | OpenClaw: Matrix profile config persistence was reachable from operator.write message tools | 2026-05-05 |
| CVE-2026-43528 | 🔴 HIGH | 7.1 | OpenClaw: config.get redaction bypass through sourceConfig and runtimeConfig aliases | 2026-05-05 |
| CVE-2026-43567 | 🔴 HIGH | 7.1 | OpenClaw < 2026.4.10 - Path Traversal in screen_record outPath Parameter | 2026-05-05 |
| CVE-2026-43568 | 🔴 HIGH | 7.1 | OpenClaw: Memory dreaming config persistence was reachable from operator.write commands | 2026-05-05 |
| CVE-2026-43531 | 🔴 HIGH | 7 | OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File | 2026-05-05 |
| CVE-2026-28480 | 🟡 MEDIUM | 6.9 | OpenClaw Telegram allowlist authorization accepted mutable usernames | 2026-03-05 |
| CVE-2026-29612 | 🟡 MEDIUM | 6.8 | OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding | 2026-03-05 |
| CVE-2026-28452 | 🟡 MEDIUM | 6.7 | OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) | 2026-03-05 |
| CVE-2026-26328 | 🟡 MEDIUM | 6.5 | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities | 2026-02-19 |
| CVE-2026-43527 | 🟡 MEDIUM | 6.3 | OpenClaw: Browser SSRF policy default allowed private-network navigation | 2026-05-05 |
| CVE-2026-43572 | 🟡 MEDIUM | 6.3 | OpenClaw: Microsoft Teams SSO invoke handler missed sender authorization checks | 2026-05-05 |
| CVE-2026-43574 | 🟡 MEDIUM | 6 | OpenClaw < 2026.4.12 - Improper Authorization via Empty Approver Lists | 2026-05-05 |
| CVE-2026-41915 | 🟡 MEDIUM | 5.8 | OpenClaw: GIT_DIR and related git plumbing env vars missing from exec env denylist (GHSA-m866-6qv5-p2fg variant) | 2026-04-28 |
| CVE-2026-42438 | 🟡 MEDIUM | 4.9 | OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure | 2026-05-05 |
| CVE-2026-42436 | 🟡 MEDIUM | 4.9 | OpenClaw: Browser snapshot and screenshot routes could expose internal page content after navigation | 2026-05-05 |
| CVE-2026-42439 | 🟡 MEDIUM | 4.9 | OpenClaw < 2026.4.10 - SSRF Policy Bypass in Browser Tabs Action Routes | 2026-05-05 |
| CVE-2026-43532 | 🟡 MEDIUM | 4.9 | OpenClaw: Discord event cover images bypassed sandbox media normalization | 2026-05-05 |
| CVE-2026-43573 | 🟡 MEDIUM | 4.9 | OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement | 2026-05-05 |
| CVE-2026-41358 | 🟢 LOW | 2.3 | OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context | 2026-04-23 |
| CVE-2026-41908 | 🟢 LOW | 2.3 | OpenClaw < 2026.4.20 - Scope Enforcement Bypass in Assistant-Media Route | 2026-04-23 |
| CVE-2026-43529 | 🟢 LOW | 2 | OpenClaw: TOCTOU read in exec script preflight | 2026-05-05 |
| CVE ID | 状态 | CNA | GHSA 发布日期 | cvelistV5 |
|---|---|---|---|---|
| CVE-2026-24763 | ✅ PUBLISHED | GitHub_M | 2026-02-02 | ✅ 已收录 |
| CVE-2026-25157 | ✅ PUBLISHED | GitHub_M | 2026-02-02 | ✅ 已收录 |
| CVE-2026-25253 | ✅ PUBLISHED | mitre | 2026-02-02 | ✅ 已收录 |
| CVE-2026-26317 | ✅ PUBLISHED | GitHub_M | 2026-02-18 | ✅ 已收录 |
| CVE-2026-26328 | ✅ PUBLISHED | GitHub_M | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28452 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28458 | ✅ PUBLISHED | VulnCheck | 2026-02-17 | ✅ 已收录 |
| CVE-2026-28469 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28478 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28480 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-29612 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-41358 | ✅ PUBLISHED | VulnCheck | 2026-05-04 | ✅ 已收录 |
| CVE-2026-41908 | ✅ PUBLISHED | VulnCheck | 2026-04-25 | ✅ 已收录 |
| CVE-2026-41915 | ✅ PUBLISHED | VulnCheck | 2026-04-09 | ✅ 已收录 |
| CVE-2026-42433 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42434 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42435 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42436 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42437 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42438 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42439 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43526 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43527 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43528 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43529 | ✅ PUBLISHED | VulnCheck | 2026-04-16 | ✅ 已收录 |
| CVE-2026-43530 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43531 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43532 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43533 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43534 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43535 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43566 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43567 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43568 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43569 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43571 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43572 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43573 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43574 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-6011 | ✅ PUBLISHED | — | 2026-04-10 | ✅ 已收录 |
| CVE-2026-43533 | ✅ PUBLISHED | | [GHSA-2cq5-mf3v-mx44](https://github.com/advisories/GHSA-2cq5-mf3v-mx44) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42433 | ✅ PUBLISHED | | [GHSA-736r-jwj6-4w23](https://github.com/advisories/GHSA-736r-jwj6-4w23) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43569 | ✅ PUBLISHED | | [GHSA-82qx-6vj7-p8m2](https://github.com/advisories/GHSA-82qx-6vj7-p8m2) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42437 | ✅ PUBLISHED | | [GHSA-8372-7vhw-cm6q](https://github.com/advisories/GHSA-8372-7vhw-cm6q) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-28469 | ✅ PUBLISHED | | [GHSA-3fqr-4cg8-h96q](https://github.com/advisories/GHSA-3fqr-4cg8-h96q) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28478 | ✅ PUBLISHED | | [GHSA-mr32-vwc2-5j6h](https://github.com/advisories/GHSA-mr32-vwc2-5j6h) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-25157 | ✅ PUBLISHED | | [GHSA-g8p2-7wf7-98mq](https://github.com/advisories/GHSA-g8p2-7wf7-98mq) | 2026-02-02 | ✅ 已收录 |
| CVE-2026-24763 | ✅ PUBLISHED | | [GHSA-r2c6-8jc8-g32w](https://github.com/advisories/GHSA-r2c6-8jc8-g32w) | 2026-02-02 | ✅ 已收录 |
| CVE-2026-42438 | ✅ PUBLISHED | | [GHSA-527m-976r-jf79](https://github.com/advisories/GHSA-527m-976r-jf79) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42439 | ✅ PUBLISHED | | [GHSA-jf25-7968-h2h5](https://github.com/advisories/GHSA-jf25-7968-h2h5) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43527 | ✅ PUBLISHED | | [GHSA-2767-2q9v-9326](https://github.com/advisories/GHSA-2767-2q9v-9326) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43531 | ✅ PUBLISHED | | [GHSA-c9h3-5p7r-mrjh](https://github.com/advisories/GHSA-c9h3-5p7r-mrjh) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43574 | ✅ PUBLISHED | | [GHSA-7g8c-cfr3-vqqr](https://github.com/advisories/GHSA-7g8c-cfr3-vqqr) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42435 | ✅ PUBLISHED | | [GHSA-5gjc-grvm-m88j](https://github.com/advisories/GHSA-5gjc-grvm-m88j) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43566 | ✅ PUBLISHED | | [GHSA-c4qm-58hj-j6pj](https://github.com/advisories/GHSA-c4qm-58hj-j6pj) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43535 | ✅ PUBLISHED | | [GHSA-f934-5rqf-xx47](https://github.com/advisories/GHSA-f934-5rqf-xx47) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-28480 | ✅ PUBLISHED | | [GHSA-h89v-j3x9-8wqj](https://github.com/advisories/GHSA-h89v-j3x9-8wqj) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-29612 | ✅ PUBLISHED | | [GHSA-g34w-4xqq-h79m](https://github.com/advisories/GHSA-g34w-4xqq-h79m) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-41358 | ✅ PUBLISHED | | [GHSA-v8qf-fr4g-28p2](https://github.com/advisories/GHSA-v8qf-fr4g-28p2) | 2026-05-04 | ✅ 已收录 |
| CVE-2026-43572 | ✅ PUBLISHED | | [GHSA-r77c-2cmr-7p47](https://github.com/advisories/GHSA-r77c-2cmr-7p47) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43529 | ✅ PUBLISHED | | [GHSA-52vj-fvrv-7q82](https://github.com/advisories/GHSA-52vj-fvrv-7q82) | 2026-04-16 | ✅ 已收录 |
| CVE-2026-41915 | ✅ PUBLISHED | | [GHSA-chm2-m3w2-wcxm](https://github.com/advisories/GHSA-chm2-m3w2-wcxm) | 2026-04-09 | ✅ 已收录 |