| CVE-2026-32922 |
🟣 CRITICAL |
9.4 |
OpenClaw < 2026.3.11 - Privilege Escalation via Unvalidated Scope in device.token.rotate |
2026-03-29 |
| CVE-2026-28474 |
🟣 CRITICAL |
9.3 |
OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing |
2026-03-05 |
| CVE-2026-32987 |
🟣 CRITICAL |
9.3 |
OpenClaw < 2026.3.13 - Bootstrap Setup Code Replay via Device Pairing |
2026-03-29 |
| CVE-2026-28391 |
🟣 CRITICAL |
9.2 |
OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcement |
2026-03-05 |
| CVE-2026-28446 |
🟣 CRITICAL |
9.2 |
OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching |
2026-03-05 |
| CVE-2026-32917 |
🟣 CRITICAL |
9.2 |
OpenClaw < 2026.3.13 - Remote Command Injection via Unsanitized iMessage Attachment Paths in SCP |
2026-03-31 |
| CVE-2026-25253 |
🔴 HIGH |
8.8 |
OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl |
2026-02-01 |
| CVE-2026-24763 |
🔴 HIGH |
8.8 |
OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable |
2026-02-02 |
| CVE-2026-22171 |
🔴 HIGH |
8.8 |
OpenClaw < 2026.2.19 - Path Traversal in Feishu Media Temporary File Naming |
2026-03-18 |
| CVE-2026-32973 |
🔴 HIGH |
8.8 |
OpenClaw < 2026.3.11 - Exec Allowlist Pattern Overmatch via POSIX Path Normalization |
2026-03-29 |
| CVE-2026-28461 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.1 - Unbounded Memory Growth in Zalo Webhook via Query String Key Churn |
2026-03-19 |
| CVE-2026-28478 |
🔴 HIGH |
8.7 |
OpenClaw affected by denial of service via unbounded webhook request body buffering |
2026-03-05 |
| CVE-2026-32049 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass |
2026-03-21 |
| CVE-2026-32980 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.13 - Resource Exhaustion via Unauthenticated Telegram Webhook Request |
2026-03-29 |
| CVE-2026-32982 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.13 - Telegram Bot Token Exposure in Media Fetch Error Logs |
2026-03-31 |
| CVE-2026-33573 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.11 - Workspace Boundary Bypass via Agent RPC Parameters |
2026-03-29 |
| CVE-2026-35639 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.22 - Privilege Escalation via device.pair.approve Scope Validation |
2026-04-09 |
| CVE-2026-35638 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.22 - Privilege Escalation via Self-Declared Scopes in Trusted-Proxy Control UI |
2026-04-09 |
| CVE-2026-27001 |
🔴 HIGH |
8.6 |
OpenClaw: Unsanitized CWD path injection into LLM prompts |
2026-02-19 |
| CVE-2026-33579 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.3.28 - Privilege Escalation via Missing Caller Scope Validation in Device Pair Approval |
2026-03-31 |
| CVE-2026-34503 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.3.28 - Incomplete WebSocket Session Termination on Device Removal and Token Revocation |
2026-03-31 |
| CVE-2026-33577 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve |
2026-03-31 |
| CVE-2026-28450 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.2.12 - Unauthenticated Profile Tampering via Nostr Plugin HTTP Endpoints |
2026-03-05 |
| CVE-2026-28393 |
🔴 HIGH |
8.3 |
OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal |
2026-03-05 |
| CVE-2026-28453 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction |
2026-03-05 |
| CVE-2026-32036 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.2.26- Authentication Bypass via Encoded Dot-Segment Traversal in /api/channels |
2026-03-19 |
| CVE-2026-35618 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.3.23 - Replay Identity Drift via Query-Only Variants in Plivo V2 Verification |
2026-04-09 |
| CVE-2026-28469 |
🔴 HIGH |
8.2 |
OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting |
2026-03-05 |
| CVE-2026-32045 |
🔴 HIGH |
8.2 |
OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth |
2026-03-21 |
| CVE-2026-25157 |
🔴 HIGH |
7.8 |
OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand |
2026-02-04 |
| CVE-2026-35650 |
🔴 HIGH |
7.7 |
OpenClaw < 2026.3.22 - Environment Variable Override Bypass via Inconsistent Sanitization |
2026-04-10 |
| CVE-2026-35666 |
🔴 HIGH |
7.7 |
OpenClaw < 2026.3.22 - Allowlist Bypass via Unregistered Time Dispatch Wrapper |
2026-04-10 |
| CVE-2026-27487 |
🔴 HIGH |
7.6 |
OpenClaw: Prevent shell injection in macOS keychain credential write |
2026-02-21 |
| CVE-2026-32007 |
🔴 HIGH |
7.6 |
OpenClaw < 2026.2.23 - Sandbox Bypass in apply_patch Tool via Workspace-Only Check Bypass |
2026-03-19 |
| CVE-2026-26319 |
🔴 HIGH |
7.5 |
OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests |
2026-02-19 |
| CVE-2026-25474 |
🔴 HIGH |
7.5 |
OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret`) → auth bypass |
2026-02-19 |
| CVE-2026-26321 |
🔴 HIGH |
7.5 |
OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension |
2026-02-19 |
| CVE-2026-28458 |
🔴 HIGH |
7.4 |
OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access |
2026-03-05 |
| CVE-2026-28473 |
🔴 HIGH |
7.2 |
OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command |
2026-03-05 |
| CVE-2026-35653 |
🔴 HIGH |
7.2 |
OpenClaw < 2026.3.24 - Incorrect Authorization in POST /reset-profile via browser.request |
2026-04-10 |
| CVE-2026-26317 |
🔴 HIGH |
7.1 |
OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints |
2026-02-19 |
| CVE-2026-22169 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.22 - Allowlist Bypass via sort Configuration in safeBins |
2026-03-18 |
| CVE-2026-22175 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.23 - Exec Approval Bypass via Unrecognized Multiplexer Shell Wrappers |
2026-03-18 |
| CVE-2026-22168 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.21 - Command Injection via cmd.exe /c Trailing Arguments in system.run |
2026-03-18 |
| CVE-2026-29607 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.22 - Authorization Bypass via allow-always Wrapper Persistence |
2026-03-19 |
| CVE-2026-28459 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile Path |
2026-03-05 |
| CVE-2026-32027 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.26 - Improper Authorization via DM Pairing Store Identity Inheritance in Group Allowlist |
2026-03-19 |
| CVE-2026-32976 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.3.11 - Account-Scoped configWrites Policy Bypass via Channel Commands |
2026-03-31 |
| CVE-2026-35631 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.3.22 - Missing Authorization Enforcement in Internal ACP Chat Commands |
2026-04-09 |
| CVE-2026-35644 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.3.22 - Credential Exposure via baseUrl Fields in Gateway Snapshots |
2026-04-09 |
| CVE-2026-35657 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.3.25 - Authorization Bypass in HTTP Session History Route |
2026-04-10 |
| CVE-2026-40037 |
🔴 HIGH |
7.1 |
OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects |
2026-04-08 |
| CVE-2026-22176 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.2.19 - Command Injection via Unescaped Environment Variables in Windows Scheduled Task Script Generation |
2026-03-19 |
| CVE-2026-22177 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars |
2026-03-18 |
| CVE-2026-28480 |
🟡 MEDIUM |
6.9 |
OpenClaw Telegram allowlist authorization accepted mutable usernames |
2026-03-05 |
| CVE-2026-32975 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.12 - Weak Authorization via Mutable Group Names in Zalouser Allowlist |
2026-03-29 |
| CVE-2026-32919 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.11 - Unauthorized Session Reset via agent Slash Commands |
2026-03-29 |
| CVE-2026-35627 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.22 - Unauthenticated Cryptographic Work in Nostr Inbound DM Handling |
2026-04-09 |
| CVE-2026-35633 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.22 - Unbounded Memory Allocation via Remote Media Error Responses |
2026-04-09 |
| CVE-2026-34510 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.22 - Remote File URL Acceptance in Windows Media Loaders |
2026-04-01 |
| CVE-2026-35652 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.22 - Unauthorized Action Execution via Callback Dispatch |
2026-04-10 |
| CVE-2026-35647 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.25 - Direct Message Policy Bypass via Verification Notices |
2026-04-10 |
| CVE-2026-35654 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.25 - Authorization Bypass in Microsoft Teams Feedback Invoke |
2026-04-10 |
| CVE-2026-35667 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.24 - Improper Process Termination via Unpatched killProcessTree in shell-utils.ts |
2026-04-10 |
| CVE-2026-32024 |
🟡 MEDIUM |
6.8 |
OpenClaw < 2026.2.22 - Symlink Traversal in Avatar Handling |
2026-03-19 |
| CVE-2026-29612 |
🟡 MEDIUM |
6.8 |
OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding |
2026-03-05 |
| CVE-2026-28452 |
🟡 MEDIUM |
6.7 |
OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) |
2026-03-05 |
| CVE-2026-32044 |
🟡 MEDIUM |
6.7 |
OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation |
2026-03-21 |
| CVE-2026-26328 |
🟡 MEDIUM |
6.5 |
OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities |
2026-02-19 |
| CVE-2026-28449 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.25 - Webhook Replay Attack via Missing Durable Replay Suppression |
2026-03-19 |
| CVE-2026-28395 |
🟡 MEDIUM |
6.3 |
OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrl |
2026-03-05 |
| CVE-2026-28451 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching |
2026-03-05 |
| CVE-2026-28471 |
🟡 MEDIUM |
6.3 |
OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin |
2026-03-05 |
| CVE-2026-32031 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.26 - Authentication Bypass via Path Canonicalization Mismatch in /api/channels Gateway |
2026-03-19 |
| CVE-2026-32050 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.25 - Unauthorized Reaction Status Event Enqueue via Access Check Bypass |
2026-03-21 |
| CVE-2026-33580 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.3.28 - Brute Force Attack via Missing Rate Limiting on Webhook Shared Secret Authentication |
2026-03-31 |
| CVE-2026-35628 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Telegram Webhook Rate Limiting |
2026-04-09 |
| CVE-2026-35656 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.3.22 - XFF Loopback Spoofing Bypass in Canvas Authentication and Rate Limiter |
2026-04-10 |
| CVE-2026-32057 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter |
2026-03-21 |
| CVE-2026-34511 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.4.2 - PKCE Verifier Exposure via OAuth State Parameter |
2026-04-03 |
| CVE-2026-28477 |
🟡 MEDIUM |
5.9 |
OpenClaw < 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow |
2026-03-05 |
| CVE-2026-27009 |
🟡 MEDIUM |
5.8 |
OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection |
2026-02-19 |
| CVE-2026-27670 |
🟡 MEDIUM |
5.8 |
OpenClaw < 2026.3.2 - Arbitrary File Write via ZIP Extraction Parent Symlink Race Condition |
2026-03-19 |
| CVE-2026-31995 |
🟡 MEDIUM |
5.8 |
OpenClaw 2026.1.21 < 2026.2.19 - Command Injection via Windows Shell Fallback in Lobster Extension |
2026-03-19 |
| CVE-2026-32000 |
🟡 MEDIUM |
5.8 |
OpenClaw < 2026.2.19 - Command Injection via Windows Shell Fallback in Lobster Tool Execution |
2026-03-19 |
| CVE-2026-32052 |
🟡 MEDIUM |
5.8 |
OpenClaw < 2026.2.24 - Hidden Command Execution via Shell-Wrapper Positional argv Carriers |
2026-03-21 |
| CVE-2026-32977 |
🟡 MEDIUM |
5.8 |
OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unanchored writeFile Commit Path |
2026-03-31 |
| CVE-2026-33574 |
🟡 MEDIUM |
5.8 |
OpenClaw < 2026.3.8 - Path Traversal via Tools Root Rebinding in Skills Download |
2026-03-29 |
| CVE-2026-32988 |
🟡 MEDIUM |
5.8 |
OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unvalidated Temporary File Creation |
2026-03-31 |
| CVE-2026-28457 |
🟡 MEDIUM |
5.6 |
OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter |
2026-03-05 |
| CVE-2026-31989 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.3.1 - Server-Side Request Forgery via web_search Citation Redirect |
2026-03-19 |
| CVE-2026-32001 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.2.22 - Node Role Device-Identity Bypass via WebSocket Authentication |
2026-03-19 |
| CVE-2026-32921 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.3.8 - Script Content Modification via Mutable Operand Binding in system.run |
2026-03-31 |
| CVE-2026-33578 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.3.28 - Sender Policy Allowlist Bypass via Policy Downgrade in Google Chat and Zalouser Extensions |
2026-03-31 |
| CVE-2026-35619 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.3.24 - Authorization Bypass via HTTP /v1/models Endpoint |
2026-04-10 |
| CVE-2026-34425 |
🟡 MEDIUM |
5.3 |
OpenClaw - Shell-Bleed Protection Preflight Validation Bypass |
2026-04-02 |
| CVE-2026-35629 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.3.25 - Server-Side Request Forgery via Unguarded Configured Base URLs in Channel Extensions |
2026-04-09 |
| CVE-2026-35642 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.3.25 - Authorization Bypass in Group Reactions via requireMention Bypass |
2026-04-09 |
| CVE-2026-32020 |
🟡 MEDIUM |
4.8 |
OpenClaw < 2026.2.22 - Arbitrary File Read via Symlink Following in Static File Handler |
2026-03-19 |
| CVE-2026-27486 |
🟡 MEDIUM |
4.3 |
OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup |
2026-02-21 |
| CVE-2026-32040 |
🟢 LOW |
2.4 |
OpenClaw < 2026.2.23 - HTML Injection via Unvalidated Image MIME Type in Data-URL Interpolation |
2026-03-19 |
| CVE-2026-34506 |
🟢 LOW |
2.3 |
OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlist Configuration |
2026-03-31 |
| CVE-2026-35648 |
🟢 LOW |
2.3 |
OpenClaw < 2026.3.22 - Policy Bypass via Unvalidated Queued Node Actions |
2026-04-10 |
| CVE-2026-35624 |
🟢 LOW |
2.3 |
OpenClaw < 2026.3.22 - Policy Confusion via Room Name Collision in Nextcloud Talk |
2026-04-09 |
| CVE-2026-32970 |
🟢 LOW |
2 |
OpenClaw < 2026.3.11 - Credential Fallback Logic Bypass via Unavailable Local Auth SecretRefs |
2026-03-31 |