安全漏洞追踪面板 — 基于 cvelistV5 + GitHub Advisory Database 数据
| CVE ID | 严重性 | CVSS | 漏洞描述 | 发布日期 |
|---|---|---|---|---|
| CVE-2026-25253 | 🔴 HIGH | 8.8 | OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl | 2026-02-01 |
| CVE-2026-24763 | 🔴 HIGH | 8.8 | OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable | 2026-02-02 |
| CVE-2026-28478 | 🔴 HIGH | 8.7 | OpenClaw affected by denial of service via unbounded webhook request body buffering | 2026-03-05 |
| CVE-2026-32846 | 🔴 HIGH | 8.7 | OpenClaw Media Parsing Path Traversal to Arbitrary File Read | 2026-03-26 |
| CVE-2026-33577 | 🔴 HIGH | 8.6 | OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve | 2026-03-31 |
| CVE-2026-34503 | 🔴 HIGH | 8.6 | OpenClaw's device removal and token revocation do not terminate active WebSocket sessions | 2026-03-31 |
| CVE-2026-28469 | 🔴 HIGH | 8.2 | OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting | 2026-03-05 |
| CVE-2026-25157 | 🔴 HIGH | 7.8 | OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand | 2026-02-04 |
| CVE-2026-28458 | 🔴 HIGH | 7.4 | OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access | 2026-03-05 |
| CVE-2026-26317 | 🔴 HIGH | 7.1 | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | 2026-02-19 |
| CVE-2026-33581 | 🔴 HIGH | 7.1 | OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters | 2026-03-31 |
| CVE-2026-28480 | 🟡 MEDIUM | 6.9 | OpenClaw Telegram allowlist authorization accepted mutable usernames | 2026-03-05 |
| CVE-2026-33576 | 🟡 MEDIUM | 6.9 | OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel | 2026-03-31 |
| CVE-2026-29612 | 🟡 MEDIUM | 6.8 | OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding | 2026-03-05 |
| CVE-2026-28452 | 🟡 MEDIUM | 6.7 | OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) | 2026-03-05 |
| CVE-2026-26328 | 🟡 MEDIUM | 6.5 | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities | 2026-02-19 |
| CVE-2026-33578 | 🟡 MEDIUM | 5.3 | OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade | 2026-03-31 |
| CVE ID | 状态 | CNA | GHSA 发布日期 | cvelistV5 |
|---|---|---|---|---|
| CVE-2026-24763 | ✅ PUBLISHED | GitHub_M | 2026-02-02 | ✅ 已收录 |
| CVE-2026-25157 | ✅ PUBLISHED | GitHub_M | 2026-02-02 | ✅ 已收录 |
| CVE-2026-25253 | ✅ PUBLISHED | mitre | 2026-02-02 | ✅ 已收录 |
| CVE-2026-26317 | ✅ PUBLISHED | GitHub_M | 2026-02-18 | ✅ 已收录 |
| CVE-2026-26328 | ✅ PUBLISHED | GitHub_M | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28452 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28458 | ✅ PUBLISHED | VulnCheck | 2026-02-17 | ✅ 已收录 |
| CVE-2026-28469 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28478 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28480 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-29612 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-32846 | ✅ PUBLISHED | VulnCheck | 2026-03-26 | ✅ 已收录 |
| CVE-2026-33576 | ✅ PUBLISHED | VulnCheck | 2026-03-31 | ✅ 已收录 |
| CVE-2026-33577 | ✅ PUBLISHED | VulnCheck | 2026-04-01 | ✅ 已收录 |
| CVE-2026-33578 | ✅ PUBLISHED | VulnCheck | 2026-04-01 | ✅ 已收录 |
| CVE-2026-33581 | ✅ PUBLISHED | VulnCheck | 2026-03-31 | ✅ 已收录 |
| CVE-2026-34503 | ✅ PUBLISHED | VulnCheck | 2026-03-31 | ✅ 已收录 |
| CVE-2026-33581 | ✅ PUBLISHED | | [GHSA-2pr2-hcv6-7gwv](https://github.com/advisories/GHSA-2pr2-hcv6-7gwv) | 2026-03-31 | ✅ 已收录 |
| CVE-2026-32846 | ✅ PUBLISHED | | [GHSA-7xr2-q9vf-x4r5](https://github.com/advisories/GHSA-7xr2-q9vf-x4r5) | 2026-03-26 | ✅ 已收录 |
| CVE-2026-28469 | ✅ PUBLISHED | | [GHSA-3fqr-4cg8-h96q](https://github.com/advisories/GHSA-3fqr-4cg8-h96q) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28478 | ✅ PUBLISHED | | [GHSA-mr32-vwc2-5j6h](https://github.com/advisories/GHSA-mr32-vwc2-5j6h) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-25157 | ✅ PUBLISHED | | [GHSA-g8p2-7wf7-98mq](https://github.com/advisories/GHSA-g8p2-7wf7-98mq) | 2026-02-02 | ✅ 已收录 |
| CVE-2026-24763 | ✅ PUBLISHED | | [GHSA-r2c6-8jc8-g32w](https://github.com/advisories/GHSA-r2c6-8jc8-g32w) | 2026-02-02 | ✅ 已收录 |
| CVE-2026-33578 | ✅ PUBLISHED | | [GHSA-2x4x-cc5g-qmmg](https://github.com/advisories/GHSA-2x4x-cc5g-qmmg) | 2026-04-01 | ✅ 已收录 |
| CVE-2026-33576 | ✅ PUBLISHED | | [GHSA-9528-x887-j2fp](https://github.com/advisories/GHSA-9528-x887-j2fp) | 2026-03-31 | ✅ 已收录 |
| CVE-2026-28480 | ✅ PUBLISHED | | [GHSA-h89v-j3x9-8wqj](https://github.com/advisories/GHSA-h89v-j3x9-8wqj) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-29612 | ✅ PUBLISHED | | [GHSA-g34w-4xqq-h79m](https://github.com/advisories/GHSA-g34w-4xqq-h79m) | 2026-02-18 | ✅ 已收录 |