每日自动更新

🛡️ UCloud OpenClaw CVEs

安全漏洞追踪面板 — 基于 cvelistV5 + GitHub Advisory Database 数据

20
已发布 CVE
138
安全公告
56
HIGH / CRITICAL
20/20
Pipeline 全部已发布

📋 已发布 CVE(cvelistV5)

20
CVE ID严重性CVSS漏洞描述发布日期
CVE-2026-24763 🔴 HIGH 8.8 OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable 2026-02-02
CVE-2026-25253 🔴 HIGH 8.8 OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl 2026-02-01
CVE-2026-28478 🔴 HIGH 8.7 OpenClaw affected by denial of service via unbounded webhook request body buffering 2026-03-05
CVE-2026-33577 🔴 HIGH 8.6 OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve 2026-03-31
CVE-2026-33579 🔴 HIGH 8.6 OpenClaw: /pair approve command path omitted caller scope subsetting and reopened device pairing escalation 2026-03-31
CVE-2026-34503 🔴 HIGH 8.6 OpenClaw's device removal and token revocation do not terminate active WebSocket sessions 2026-03-31
CVE-2026-28469 🔴 HIGH 8.2 OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting 2026-03-05
CVE-2026-25157 🔴 HIGH 7.8 OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand 2026-02-04
CVE-2026-28458 🔴 HIGH 7.4 OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access 2026-03-05
CVE-2026-26317 🔴 HIGH 7.1 OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints 2026-02-19
CVE-2026-33581 🔴 HIGH 7.1 OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters 2026-03-31
CVE-2026-28480 🟡 MEDIUM 6.9 OpenClaw Telegram allowlist authorization accepted mutable usernames 2026-03-05
CVE-2026-33576 🟡 MEDIUM 6.9 OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel 2026-03-31
CVE-2026-34504 🟡 MEDIUM 6.9 OpenClaw affected by SSRF via unguarded image download in fal provider 2026-03-31
CVE-2026-29612 🟡 MEDIUM 6.8 OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding 2026-03-05
CVE-2026-28452 🟡 MEDIUM 6.7 OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) 2026-03-05
CVE-2026-26328 🟡 MEDIUM 6.5 OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities 2026-02-19
CVE-2026-33580 🟡 MEDIUM 6.3 OpenClaw's Nextcloud Talk webhook missing rate limiting on shared secret authentication 2026-03-31
CVE-2026-33578 🟡 MEDIUM 5.3 OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade 2026-03-31
CVE-2026-34425 🟡 MEDIUM 5.3 OpenClaw - Shell-Bleed Protection Preflight Validation Bypass 2026-04-02

🔄 CVE 发布流水线

20/20 已发布
CVE ID状态CNAGHSA 发布日期cvelistV5
CVE-2026-24763 ✅ PUBLISHED GitHub_M 2026-02-02 ✅ 已收录
CVE-2026-25157 ✅ PUBLISHED GitHub_M 2026-02-02 ✅ 已收录
CVE-2026-25253 ✅ PUBLISHED mitre 2026-02-02 ✅ 已收录
CVE-2026-26317 ✅ PUBLISHED GitHub_M 2026-02-18 ✅ 已收录
CVE-2026-26328 ✅ PUBLISHED GitHub_M 2026-02-18 ✅ 已收录
CVE-2026-28452 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28458 ✅ PUBLISHED VulnCheck 2026-02-17 ✅ 已收录
CVE-2026-28469 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28478 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28480 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-29612 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-33576 ✅ PUBLISHED VulnCheck 2026-03-31 ✅ 已收录
CVE-2026-33577 ✅ PUBLISHED VulnCheck 2026-04-01 ✅ 已收录
CVE-2026-33578 ✅ PUBLISHED VulnCheck 2026-04-01 ✅ 已收录
CVE-2026-33579 ✅ PUBLISHED VulnCheck 2026-03-31 ✅ 已收录
CVE-2026-33580 ✅ PUBLISHED VulnCheck 2026-03-31 ✅ 已收录
CVE-2026-33581 ✅ PUBLISHED VulnCheck 2026-03-31 ✅ 已收录
CVE-2026-34425 ✅ PUBLISHED VulnCheck 2026-04-06 ✅ 已收录
CVE-2026-34503 ✅ PUBLISHED VulnCheck 2026-03-31 ✅ 已收录
CVE-2026-34504 ✅ PUBLISHED VulnCheck 2026-04-01 ✅ 已收录
CVE-2026-33581 ✅ PUBLISHED | [GHSA-2pr2-hcv6-7gwv](https://github.com/advisories/GHSA-2pr2-hcv6-7gwv) 2026-03-31 ✅ 已收录
CVE-2026-33579 ✅ PUBLISHED | [GHSA-6pfc-6m7w-m8fx](https://github.com/advisories/GHSA-6pfc-6m7w-m8fx) 2026-03-31 ✅ 已收录
CVE-2026-28469 ✅ PUBLISHED | [GHSA-3fqr-4cg8-h96q](https://github.com/advisories/GHSA-3fqr-4cg8-h96q) 2026-02-18 ✅ 已收录
CVE-2026-28478 ✅ PUBLISHED | [GHSA-mr32-vwc2-5j6h](https://github.com/advisories/GHSA-mr32-vwc2-5j6h) 2026-02-18 ✅ 已收录
CVE-2026-25157 ✅ PUBLISHED | [GHSA-g8p2-7wf7-98mq](https://github.com/advisories/GHSA-g8p2-7wf7-98mq) 2026-02-02 ✅ 已收录
CVE-2026-24763 ✅ PUBLISHED | [GHSA-r2c6-8jc8-g32w](https://github.com/advisories/GHSA-r2c6-8jc8-g32w) 2026-02-02 ✅ 已收录
CVE-2026-34425 ✅ PUBLISHED | [GHSA-6336-qqw9-v6x6](https://github.com/advisories/GHSA-6336-qqw9-v6x6) 2026-04-06 ✅ 已收录
CVE-2026-33578 ✅ PUBLISHED | [GHSA-2x4x-cc5g-qmmg](https://github.com/advisories/GHSA-2x4x-cc5g-qmmg) 2026-04-01 ✅ 已收录
CVE-2026-33580 ✅ PUBLISHED | [GHSA-v2v2-f783-358j](https://github.com/advisories/GHSA-v2v2-f783-358j) 2026-03-31 ✅ 已收录
CVE-2026-28480 ✅ PUBLISHED | [GHSA-h89v-j3x9-8wqj](https://github.com/advisories/GHSA-h89v-j3x9-8wqj) 2026-02-18 ✅ 已收录
CVE-2026-29612 ✅ PUBLISHED | [GHSA-g34w-4xqq-h79m](https://github.com/advisories/GHSA-g34w-4xqq-h79m) 2026-02-18 ✅ 已收录
CVE-2026-34504 ✅ PUBLISHED | [GHSA-g86v-f9qv-rh6m](https://github.com/advisories/GHSA-g86v-f9qv-rh6m) 2026-04-01 ✅ 已收录

📢 安全公告精选

138+
GHSA-9p3r-hh9 CRITICAL
OpenClaw: Sandbox escape via TOCTOU race in remote FS bridge readFile
2026-04-03
GHSA-g5cg-8x5 CRITICAL
OpenClaw: Heartbeat context inheritance bypasses sandbox via senderIsOwner escalation
2026-04-02
GHSA-8rh7-677 CRITICAL
OpenClaw has a CWD `.env` environment variable injection which bypasses host-env policy and allows config takeover
2026-04-01
GHSA-hc5h-pmr CRITICAL
OpenClaw: /pair approve command path omitted caller scope subsetting and reopened device pairing escalation
2026-03-31 CVE-2026-33579
GHSA-j7p2-qcw CRITICAL
OpenClaw's incomplete host env sanitization blocklist allows supply-chain redirection via package-manager env overrides
2026-03-31
GHSA-phgf-384 CRITICAL
Duplicate Advisory: OpenClaw: Plugin subagent routes could bypass gateway authorization with synthetic admin scopes
2026-03-31
OpenClaw: Gemini OAuth exposed the PKCE verifier through the OAuth state parameter
2026-04-04
OpenClaw: macOS Tailnet DNS Spoofing & Credential Exfiltration
2026-04-03
OpenClaw: Unbound bootstrap setup codes allow privilege escalation during pairing
2026-04-03
OpenClaw: Node browser proxy `allowProfiles` bypass through persistent profile mutation and runtime profile selection
2026-04-03
OpenClaw: Paired node escalates to gateway RCE via unrestricted node.event agent dispatch
2026-04-03
OpenClaw: Incomplete scope-clearing fix allows operator.admin escalation via trusted-proxy auth mode
2026-04-03

📊 漏洞分类

白名单绕过 (Allowlist Bypass)
60
注入攻击 (XSS/CSRF/Prompt/Command)
34
认证绕过 / 缺失认证
10
SSRF
5
拒绝服务 (DoS)
6
路径穿越 (CWE-22)
3
原型污染 (Prototype Pollution)
1

💡 关键洞察

📈
7.4
平均 CVSS 评分
🔴
280%
HIGH 及以上漏洞占比
100%
CVE 已发布到 cvelistV5
🛡️
100%
已提供修复版本
🏢
3
CNA 来源 (VulnCheck / GitHub / MITRE)
📦
npm
受影响包 (openclaw)