| CVE-2026-32922 |
🟣 CRITICAL |
9.4 |
OpenClaw < 2026.3.11 - Privilege Escalation via Unvalidated Scope in device.token.rotate |
2026-03-29 |
| CVE-2026-32915 |
🟣 CRITICAL |
9.3 |
OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Subagent Control Surface |
2026-03-29 |
| CVE-2026-43534 |
🟣 CRITICAL |
9.3 |
OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events |
2026-05-05 |
| CVE-2026-32917 |
🟣 CRITICAL |
9.2 |
OpenClaw < 2026.3.13 - Remote Command Injection via Unsanitized iMessage Attachment Paths in SCP |
2026-03-31 |
| CVE-2026-43585 |
🟣 CRITICAL |
9.2 |
OpenClaw: Gateway HTTP endpoints re-resolve bearer auth after SecretRef rotation |
2026-05-06 |
| CVE-2026-44109 |
🟣 CRITICAL |
9.2 |
OpenClaw: Feishu webhook and card-action validation now fail closed |
2026-05-06 |
| CVE-2026-43578 |
🟣 CRITICAL |
9.1 |
OpenClaw 2026.3.31 < 2026.4.10 - Privilege Escalation via Missed Async Exec Completion Events in Heartbeat Owner Downgrade |
2026-05-06 |
| CVE-2026-43566 |
🟣 CRITICAL |
9.1 |
OpenClaw 2026.4.7 < 2026.4.14 - Privilege Escalation via Untrusted Webhook Wake Events |
2026-05-05 |
| CVE-2026-43533 |
🔴 HIGH |
8.9 |
OpenClaw < 2026.4.10 - Arbitrary Local File Read via QQBot Media Tags |
2026-05-05 |
| CVE-2026-25253 |
🔴 HIGH |
8.8 |
OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl |
2026-02-01 |
| CVE-2026-24763 |
🔴 HIGH |
8.8 |
OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable |
2026-02-02 |
| CVE-2026-32973 |
🔴 HIGH |
8.8 |
OpenClaw < 2026.3.11 - Exec Allowlist Pattern Overmatch via POSIX Path Normalization |
2026-03-29 |
| CVE-2026-28478 |
🔴 HIGH |
8.7 |
OpenClaw affected by denial of service via unbounded webhook request body buffering |
2026-03-05 |
| CVE-2026-32013 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods |
2026-03-19 |
| CVE-2026-32051 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.1 - Authorization Bypass in Agent Runs via Owner-Only Tool Access |
2026-03-21 |
| CVE-2026-32062 |
🔴 HIGH |
8.7 |
OpenClaw 2026.2.21-2 < 2026.2.22 - Unauthenticated WebSocket Resource Exhaustion via Media Stream |
2026-03-11 |
| CVE-2026-32982 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.13 - Telegram Bot Token Exposure in Media Fetch Error Logs |
2026-03-31 |
| CVE-2026-41399 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.28 - Denial of Service via Unbounded Pre-auth WebSocket Upgrades |
2026-04-28 |
| CVE-2026-42426 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.4.8 - Improper Authorization in node.pair.approve via operator.write Scope |
2026-04-28 |
| CVE-2026-42435 |
🔴 HIGH |
8.7 |
OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms |
2026-05-05 |
| CVE-2026-43530 |
🔴 HIGH |
8.7 |
OpenClaw: busybox and toybox applet execution weakened exec approval binding |
2026-05-05 |
| CVE-2026-42434 |
🔴 HIGH |
8.7 |
OpenClaw: Sandboxed agents could escape exec routing via host=node override |
2026-05-05 |
| CVE-2026-43584 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.4.10 - Insufficient Environment Variable Denylist in Exec Policy |
2026-05-06 |
| CVE-2026-33579 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.3.28 - Privilege Escalation via Missing Caller Scope Validation in Device Pair Approval |
2026-03-31 |
| CVE-2026-35643 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.3.22 - Arbitrary Code Execution via Unvalidated WebView JavascriptInterface |
2026-04-10 |
| CVE-2026-44114 |
🔴 HIGH |
8.5 |
OpenClaw: Workspace dotenv could override runtime-control environment variables |
2026-05-06 |
| CVE-2026-44118 |
🔴 HIGH |
8.5 |
OpenClaw < 2026.4.22 - Owner Context Spoofing via Bearer Token Header |
2026-05-06 |
| CVE-2026-28450 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.2.12 - Unauthenticated Profile Tampering via Nostr Plugin HTTP Endpoints |
2026-03-05 |
| CVE-2026-32036 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.2.26- Authentication Bypass via Encoded Dot-Segment Traversal in /api/channels |
2026-03-19 |
| CVE-2026-43526 |
🔴 HIGH |
8.3 |
OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes |
2026-05-05 |
| CVE-2026-28469 |
🔴 HIGH |
8.2 |
OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting |
2026-03-05 |
| CVE-2026-41395 |
🔴 HIGH |
8.2 |
OpenClaw < 2026.3.28 - Webhook Replay via Query Parameter Reordering in Plivo V3 |
2026-04-28 |
| CVE-2026-42437 |
🔴 HIGH |
8.2 |
OpenClaw 2026.4.9 < 2026.4.10 - Denial of Service via Oversized WebSocket Frames in Voice-call Realtime Path |
2026-05-05 |
| CVE-2026-25157 |
🔴 HIGH |
7.8 |
OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand |
2026-02-04 |
| CVE-2026-32048 |
🔴 HIGH |
7.7 |
OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn |
2026-03-21 |
| CVE-2026-35650 |
🔴 HIGH |
7.7 |
OpenClaw < 2026.3.22 - Environment Variable Override Bypass via Inconsistent Sanitization |
2026-04-10 |
| CVE-2026-41378 |
🔴 HIGH |
7.7 |
OpenClaw < 2026.3.31 - Privilege Escalation to Remote Code Execution via Unrestricted node.event Agent Dispatch |
2026-04-28 |
| CVE-2026-43569 |
🔴 HIGH |
7.7 |
OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins |
2026-05-05 |
| CVE-2026-44110 |
🔴 HIGH |
7.7 |
OpenClaw: Matrix room control-command authorization no longer trusts DM pairing-store entries |
2026-05-06 |
| CVE-2026-43571 |
🔴 HIGH |
7.7 |
OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows |
2026-05-05 |
| CVE-2026-42431 |
🔴 HIGH |
7.6 |
OpenClaw < 2026.4.8 - Persistent Profile Mutation via node.invoke(browser.proxy) Bypass |
2026-04-28 |
| CVE-2026-26316 |
🔴 HIGH |
7.5 |
OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust |
2026-02-19 |
| CVE-2026-25474 |
🔴 HIGH |
7.5 |
OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret`) → auth bypass |
2026-02-19 |
| CVE-2026-28485 |
🔴 HIGH |
7.5 |
OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints |
2026-03-05 |
| CVE-2026-28458 |
🔴 HIGH |
7.4 |
OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access |
2026-03-05 |
| CVE-2026-32016 |
🔴 HIGH |
7.3 |
OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS |
2026-03-19 |
| CVE-2026-32032 |
🔴 HIGH |
7.3 |
OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variable |
2026-03-19 |
| CVE-2026-42432 |
🔴 HIGH |
7.3 |
OpenClaw < 2026.4.8 - Command Escalation via Node Pairing Reconnect Bypass |
2026-04-28 |
| CVE-2026-35660 |
🔴 HIGH |
7.2 |
OpenClaw < 2026.3.23 - Insufficient Access Control in Gateway Agent Session Reset |
2026-04-10 |
| CVE-2026-41364 |
🔴 HIGH |
7.2 |
OpenClaw < 2026.3.31 - Arbitrary File Write via Symlink Following in SSH Sandbox Tar Upload |
2026-04-27 |
| CVE-2026-26317 |
🔴 HIGH |
7.1 |
OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints |
2026-02-19 |
| CVE-2026-22175 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.23 - Exec Approval Bypass via Unrecognized Multiplexer Shell Wrappers |
2026-03-18 |
| CVE-2026-40037 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.3.31 - Unsafe Request Body Replay via fetchWithSsrFGuard Cross-Origin Redirects |
2026-04-08 |
| CVE-2026-41334 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.3.31 - Decompression Bomb Denial of Service via Image Pixel-Limit Guard Bypass |
2026-04-23 |
| CVE-2026-42433 |
🔴 HIGH |
7.1 |
OpenClaw: Matrix profile config persistence was reachable from operator.write message tools |
2026-05-05 |
| CVE-2026-43567 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.4.10 - Path Traversal in screen_record outPath Parameter |
2026-05-05 |
| CVE-2026-43568 |
🔴 HIGH |
7.1 |
OpenClaw: Memory dreaming config persistence was reachable from operator.write commands |
2026-05-05 |
| CVE-2026-32979 |
🔴 HIGH |
7 |
OpenClaw < 2026.3.11 - Unbound Interpreter and Runtime Commands Bypass in node-host Approval |
2026-03-29 |
| CVE-2026-41390 |
🔴 HIGH |
7 |
OpenClaw < 2026.3.28 - Exec Allowlist Bypass via Unregistered /usr/bin/script Wrapper |
2026-04-28 |
| CVE-2026-43531 |
🔴 HIGH |
7 |
OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File |
2026-05-05 |
| CVE-2026-27003 |
🟡 MEDIUM |
6.9 |
OpenClaw: Telegram bot token exposure via logs |
2026-02-19 |
| CVE-2026-27523 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.2.24 - Sandbox Bind Validation Bypass via Symlink-Parent Missing-Leaf Paths |
2026-03-18 |
| CVE-2026-27545 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.2.26 - Approval Bypass via Parent Symlink Current Working Directory Rebind |
2026-03-18 |
| CVE-2026-28480 |
🟡 MEDIUM |
6.9 |
OpenClaw Telegram allowlist authorization accepted mutable usernames |
2026-03-05 |
| CVE-2026-32053 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.2.23 - Twilio Webhook Replay Bypass via Randomized Event ID Normalization |
2026-03-21 |
| CVE-2026-32924 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.12 - Authorization Bypass via Misclassified Reaction Events in Feishu |
2026-03-29 |
| CVE-2026-33576 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel |
2026-03-31 |
| CVE-2026-35632 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.2.22 - Symlink Traversal via IDENTITY.md appendFile in agents.create/update |
2026-04-09 |
| CVE-2026-34426 |
🟡 MEDIUM |
6.9 |
OpenClaw - Approval Bypass via Environment Variable Normalization |
2026-04-02 |
| CVE-2026-35633 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.22 - Unbounded Memory Allocation via Remote Media Error Responses |
2026-04-09 |
| CVE-2026-41331 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.31 - Resource Consumption via Unauthorized Telegram Audio Preflight Transcription |
2026-04-20 |
| CVE-2026-41374 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.31 - Resource Consumption via Discord Audio Preflight Before Member Authorization |
2026-04-28 |
| CVE-2026-41400 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.31 - Resource Consumption via Oversized WebSocket Frames in voice-call |
2026-04-28 |
| CVE-2026-44116 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.4.22 - Server-Side Request Forgery in Zalo Photo URL Validation |
2026-05-06 |
| CVE-2026-27008 |
🟡 MEDIUM |
6.8 |
OpenClaw hardened the skill download target directory validation |
2026-02-19 |
| CVE-2026-29612 |
🟡 MEDIUM |
6.8 |
OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding |
2026-03-05 |
| CVE-2026-33572 |
🟡 MEDIUM |
6.8 |
OpenClaw < 2026.2.17 - Insufficient File Permissions in Session Transcript Files |
2026-03-29 |
| CVE-2026-28452 |
🟡 MEDIUM |
6.7 |
OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) |
2026-03-05 |
| CVE-2026-32061 |
🟡 MEDIUM |
6.7 |
OpenClaw < 2026.2.17 - Arbitrary File Read via $include Directive Path Traversal |
2026-03-11 |
| CVE-2026-26328 |
🟡 MEDIUM |
6.5 |
OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities |
2026-02-19 |
| CVE-2026-25475 |
🟡 MEDIUM |
6.5 |
OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction |
2026-02-04 |
| CVE-2026-32031 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.26 - Authentication Bypass via Path Canonicalization Mismatch in /api/channels Gateway |
2026-03-19 |
| CVE-2026-28475 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.13 - Timing Attack via Hook Token Comparison |
2026-03-05 |
| CVE-2026-32897 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback |
2026-03-21 |
| CVE-2026-32050 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.25 - Unauthorized Reaction Status Event Enqueue via Access Check Bypass |
2026-03-21 |
| CVE-2026-35628 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Telegram Webhook Rate Limiting |
2026-04-09 |
| CVE-2026-35649 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.3.22 - Settings Reconciliation Bypass via Empty Allowlist |
2026-04-10 |
| CVE-2026-41333 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.3.31 - Authentication Rate Limiting Bypass via Fake DeviceToken |
2026-04-23 |
| CVE-2026-41346 |
🟡 MEDIUM |
6.3 |
OpenClaw 2026.2.26 < 2026.3.31 - Denial of Service via Improper Pending Pairing Request Cap Enforcement |
2026-04-23 |
| CVE-2026-41389 |
🟡 MEDIUM |
6.3 |
OpenClaw: Webchat media embedding enforces local-root containment for tool-result files |
2026-04-20 |
| CVE-2026-43527 |
🟡 MEDIUM |
6.3 |
OpenClaw: Browser SSRF policy default allowed private-network navigation |
2026-05-05 |
| CVE-2026-43572 |
🟡 MEDIUM |
6.3 |
OpenClaw: Microsoft Teams SSO invoke handler missed sender authorization checks |
2026-05-05 |
| CVE-2026-44117 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.4.20 - Server-Side Request Forgery in QQBot Direct Media Upload |
2026-05-06 |
| CVE-2026-35645 |
🟡 MEDIUM |
6.1 |
OpenClaw < 2026.3.25 - Privilege Escalation via Synthetic operator.admin in deleteSession |
2026-04-09 |
| CVE-2026-41383 |
🟡 MEDIUM |
6.1 |
OpenClaw < 2026.4.2 - Arbitrary Remote Directory Deletion via Mis-scoped Mirror Mode Paths |
2026-04-28 |
| CVE-2026-28460 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.2.22 - Allowlist Bypass via Shell Line-Continuation Command Substitution in system.run |
2026-03-19 |
| CVE-2026-32002 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.2.23 - Sandbox Boundary Bypass via Image Tool workspaceOnly Bypass |
2026-03-19 |
| CVE-2026-32057 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter |
2026-03-21 |
| CVE-2026-41363 |
🟡 MEDIUM |
6 |
OpenClaw 2026.2.6 < 2026.3.28 - Arbitrary File Read via Feishu upload_image Parameter |
2026-04-27 |
| CVE-2026-43574 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.4.12 - Improper Authorization via Empty Approver Lists |
2026-05-05 |
| CVE-2026-43583 |
🟡 MEDIUM |
6 |
OpenClaw: Delivery queue recovery could lose group tool-policy context for media replay |
2026-05-06 |
| CVE-2026-44112 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.4.22 - Symlink Swap Race Condition in OpenShell FS Bridge Writes |
2026-05-06 |
| CVE-2026-44113 |
🟡 MEDIUM |
6 |
OpenClaw: OpenShell FS bridge reads pin and verify the opened file before returning bytes |
2026-05-06 |
| CVE-2026-43570 |
🟡 MEDIUM |
6 |
OpenClaw contains a symlink traversal vulnerability |
2026-05-05 |
| CVE-2026-32043 |
🟡 MEDIUM |
5.9 |
OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Parameter |
2026-03-21 |
| CVE-2026-45005 |
🟡 MEDIUM |
5.9 |
OpenClaw < 2026.4.23 - Webhook Route Secret Cache Not Invalidated After Rotation |
2026-05-11 |
| CVE-2026-31999 |
🟡 MEDIUM |
5.8 |
OpenClaw 2026.2.26 < 2026.3.1 - Current Working Directory Injection via Windows Wrapper Resolution Fallback |
2026-03-19 |
| CVE-2026-32000 |
🟡 MEDIUM |
5.8 |
OpenClaw < 2026.2.19 - Command Injection via Windows Shell Fallback in Lobster Tool Execution |
2026-03-19 |
| CVE-2026-29608 |
🟡 MEDIUM |
5.4 |
OpenClaw 2026.3.1 < 2026.3.2 - Approval Integrity Bypass via system.run argv Rewriting |
2026-03-19 |
| CVE-2026-26326 |
🟡 MEDIUM |
5.3 |
OpenClaw skills.status could leak secrets to operator.read clients |
2026-02-19 |
| CVE-2026-32899 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.2.25 - Sender Policy Bypass in Slack Reaction and Pin Event Handlers |
2026-03-21 |
| CVE-2026-35651 |
🟡 MEDIUM |
5.3 |
OpenClaw 2026.2.13 < 2026.3.25 - ANSI Escape Sequence Injection in Approval Prompt |
2026-04-10 |
| CVE-2026-41350 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.3.31 - Session Visibility Bypass via session_status in Unsandboxed Invocations |
2026-04-23 |
| CVE-2026-41377 |
🟡 MEDIUM |
5.1 |
OpenClaw < 2026.3.31 - Fail-Open Security Scan Bypass in Plugin Installation |
2026-04-28 |
| CVE-2026-42438 |
🟡 MEDIUM |
4.9 |
OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure |
2026-05-05 |
| CVE-2026-42439 |
🟡 MEDIUM |
4.9 |
OpenClaw < 2026.4.10 - SSRF Policy Bypass in Browser Tabs Action Routes |
2026-05-05 |
| CVE-2026-43532 |
🟡 MEDIUM |
4.9 |
OpenClaw: Discord event cover images bypassed sandbox media normalization |
2026-05-05 |
| CVE-2026-43573 |
🟡 MEDIUM |
4.9 |
OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement |
2026-05-05 |
| CVE-2026-43576 |
🟡 MEDIUM |
4.9 |
OpenClaw < 2026.4.5 - Second-hop SSRF via CDP /json/version WebSocket URL |
2026-05-06 |
| CVE-2026-43580 |
🟡 MEDIUM |
4.9 |
OpenClaw: Browser press/type interaction routes missed complete navigation guard coverage |
2026-05-06 |
| CVE-2026-43582 |
🟡 MEDIUM |
4.9 |
OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname Validation Bypass |
2026-05-06 |
| CVE-2026-32020 |
🟡 MEDIUM |
4.8 |
OpenClaw < 2026.2.22 - Arbitrary File Read via Symlink Following in Static File Handler |
2026-03-19 |
| CVE-2026-41912 |
🟡 MEDIUM |
4.8 |
OpenClaw < 2026.4.8 - Server-Side Request Forgery Policy Bypass via Interaction-Triggered Navigation |
2026-04-28 |
| CVE-2026-27485 |
🟡 MEDIUM |
4.6 |
OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection |
2026-02-21 |
| CVE-2026-44992 |
🟡 MEDIUM |
4.1 |
OpenClaw 2026.4.5 < 2026.4.20 - MiniMax API Host Override via Workspace dotenv |
2026-05-11 |
| CVE-2026-24764 |
🟢 LOW |
3.7 |
OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions |
2026-02-19 |
| CVE-2026-41356 |
🟢 LOW |
2.3 |
OpenClaw < 2026.3.31 - Incomplete WebSocket Session Termination in device.token.rotate |
2026-04-23 |
| CVE-2026-41358 |
🟢 LOW |
2.3 |
OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context |
2026-04-23 |
| CVE-2026-41908 |
🟢 LOW |
2.3 |
OpenClaw < 2026.4.20 - Scope Enforcement Bypass in Assistant-Media Route |
2026-04-23 |
| CVE-2026-44111 |
🟢 LOW |
2.3 |
OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get |
2026-05-06 |
| CVE-2026-44991 |
🟢 LOW |
2.3 |
OpenClaw < 2026.4.21 - Authorization Bypass in Owner-Enforced Commands via Wildcard Channel Senders |
2026-05-11 |
| CVE-2026-45000 |
🟢 LOW |
2.3 |
OpenClaw < 2026.4.20 - Server-Side Request Forgery via Browser CDP Profile Creation |
2026-05-11 |
| CVE-2026-32058 |
🟢 LOW |
2 |
OpenClaw < 2026.2.26 - Approval Context-Binding Weakness in system.run via host=node |
2026-03-21 |
| CVE-2026-31996 |
🟢 LOW |
2 |
OpenClaw < 2026.2.19 - safeBins stdin-only bypass via sort output and recursive grep flags |
2026-03-19 |
| CVE-2026-41330 |
🟢 LOW |
2 |
OpenClaw < 2026.3.31 - Environment Variable Override via Host Exec Policy |
2026-04-20 |