每日自动更新

🛡️ UCloud OpenClaw CVEs

安全漏洞追踪面板 — 基于 cvelistV5 + GitHub Advisory Database 数据

16
已发布 CVE
139
安全公告
55
HIGH / CRITICAL
16/16
Pipeline 全部已发布

📋 已发布 CVE(cvelistV5)

110
CVE ID严重性CVSS漏洞描述发布日期
CVE-2026-28466 🟣 CRITICAL 9.4 OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass 2026-03-05
CVE-2026-32978 🟣 CRITICAL 9.4 OpenClaw < 2026.3.11 - Approval Bypass via Unrecognized Script Runners 2026-03-29
CVE-2026-32038 🟣 CRITICAL 9.3 OpenClaw - Sandbox Network Isolation Bypass via docker.network=container Parameter 2026-03-19
CVE-2026-28446 🟣 CRITICAL 9.2 OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching 2026-03-05
CVE-2026-28472 🟣 CRITICAL 9.2 OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake 2026-03-05
CVE-2026-32918 🟣 CRITICAL 9.2 OpenClaw < 2026.3.11 - Session Sandbox Escape via session_status Tool 2026-03-29
CVE-2026-24763 🔴 HIGH 8.8 OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable 2026-02-02
CVE-2026-22171 🔴 HIGH 8.8 OpenClaw < 2026.2.19 - Path Traversal in Feishu Media Temporary File Naming 2026-03-18
CVE-2026-25253 🔴 HIGH 8.8 OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl 2026-02-01
CVE-2026-32974 🔴 HIGH 8.8 OpenClaw < 2026.3.12 - Forged Event Injection via Feishu Webhook Verification Token 2026-03-29
CVE-2026-28461 🔴 HIGH 8.7 OpenClaw < 2026.3.1 - Unbounded Memory Growth in Zalo Webhook via Query String Key Churn 2026-03-19
CVE-2026-28462 🔴 HIGH 8.7 OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths 2026-03-05
CVE-2026-28478 🔴 HIGH 8.7 OpenClaw affected by denial of service via unbounded webhook request body buffering 2026-03-05
CVE-2026-28479 🔴 HIGH 8.7 OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration 2026-03-05
CVE-2026-29609 🔴 HIGH 8.7 OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media Fetch 2026-03-05
CVE-2026-32059 🔴 HIGH 8.7 OpenClaw 2026.2.22-2 < 2026.2.23 - Allowlist Bypass via sort Long-Option Abbreviation in tools.exec.safeBins 2026-03-11
CVE-2026-32060 🔴 HIGH 8.7 OpenClaw < 2026.2.14 - Path Traversal in apply_patch via Crafted Paths 2026-03-11
CVE-2026-32980 🔴 HIGH 8.7 OpenClaw < 2026.3.13 - Resource Exhaustion via Unauthenticated Telegram Webhook Request 2026-03-29
CVE-2026-32982 🔴 HIGH 8.7 OpenClaw < 2026.3.13 - Telegram Bot Token Exposure in Media Fetch Error Logs 2026-03-31
CVE-2026-26323 🔴 HIGH 8.6 OpenClaw has a command injection in maintainer clawtributors updater 2026-02-19
CVE-2026-27001 🔴 HIGH 8.6 OpenClaw: Unsanitized CWD path injection into LLM prompts 2026-02-19
CVE-2026-28463 🔴 HIGH 8.6 OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist 2026-03-05
CVE-2026-32014 🔴 HIGH 8.6 OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields 2026-03-19
CVE-2026-33575 🔴 HIGH 8.6 OpenClaw < 2026.3.12 - Long-lived Credential Exposure in Pairing Setup Codes 2026-03-29
CVE-2026-33577 🔴 HIGH 8.6 OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve 2026-03-31
CVE-2026-34503 🔴 HIGH 8.6 OpenClaw's device removal and token revocation do not terminate active WebSocket sessions 2026-03-31
CVE-2026-32920 🔴 HIGH 8.6 OpenClaw < 2026.3.12 - Arbitrary Code Execution via Auto-Discovery of Workspace Plugins 2026-03-31
CVE-2026-32064 🔴 HIGH 8.5 OpenClaw < 2026.2.21 - Missing VNC Authentication in Sandbox Browser noVNC Observer 2026-03-21
CVE-2026-32036 🔴 HIGH 8.3 OpenClaw < 2026.2.26- Authentication Bypass via Encoded Dot-Segment Traversal in /api/channels 2026-03-19
CVE-2026-28392 🔴 HIGH 8.2 OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages 2026-03-05
CVE-2026-28469 🔴 HIGH 8.2 OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting 2026-03-05
CVE-2026-28465 🔴 HIGH 8.2 OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers 2026-03-05
CVE-2026-32030 🔴 HIGH 8.2 OpenClaw < 2026.2.19 - Sensitive File Disclosure via stageSandboxMedia Path Traversal 2026-03-19
CVE-2026-25157 🔴 HIGH 7.8 OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand 2026-02-04
CVE-2026-27002 🔴 HIGH 7.7 OpenClaw: Docker container escape via unvalidated bind mount config injection 2026-02-19
CVE-2026-29610 🔴 HIGH 7.7 OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling 2026-03-05
CVE-2026-32056 🔴 HIGH 7.7 OpenClaw < 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in system.run 2026-03-21
CVE-2026-32048 🔴 HIGH 7.7 OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn 2026-03-21
CVE-2026-26322 🔴 HIGH 7.6 OpenClaw Gateway tool allowed unrestricted gatewayUrl override 2026-02-19
CVE-2026-27487 🔴 HIGH 7.6 OpenClaw: Prevent shell injection in macOS keychain credential write 2026-02-21
CVE-2026-32005 🔴 HIGH 7.6 OpenClaw < 2026.2.25 - Authorization Bypass in Interactive Callbacks via Sender Check Skip 2026-03-19
CVE-2026-32007 🔴 HIGH 7.6 OpenClaw < 2026.2.23 - Sandbox Bypass in apply_patch Tool via Workspace-Only Check Bypass 2026-03-19
CVE-2026-22179 🔴 HIGH 7.5 OpenClaw < 2026.2.22 - Allowlist Bypass via Command Substitution in system.run 2026-03-18
CVE-2026-26316 🔴 HIGH 7.5 OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust 2026-02-19
CVE-2026-26319 🔴 HIGH 7.5 OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests 2026-02-19
CVE-2026-26324 🔴 HIGH 7.5 OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) 2026-02-19
CVE-2026-32041 🔴 HIGH 7.5 OpenClaw < 2026.3.1 - Unauthenticated Browser Control Access via Failed Auth Bootstrap 2026-03-19
CVE-2026-28458 🔴 HIGH 7.4 OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access 2026-03-05
CVE-2026-32015 🔴 HIGH 7.3 OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Validation 2026-03-19
CVE-2026-32032 🔴 HIGH 7.3 OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variable 2026-03-19
CVE-2026-32971 🔴 HIGH 7.3 OpenClaw < 2026.3.11 - Node-Host Approval UI Mismatch Allows Execution of Unintended Commands 2026-03-31
CVE-2026-32055 🔴 HIGH 7.2 OpenClaw < 2026.2.26 - Workspace Path Boundary Bypass via Non-existent Symlink 2026-03-21
CVE-2026-22168 🔴 HIGH 7.1 OpenClaw < 2026.2.21 - Command Injection via cmd.exe /c Trailing Arguments in system.run 2026-03-18
CVE-2026-26317 🔴 HIGH 7.1 OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints 2026-02-19
CVE-2026-26329 🔴 HIGH 7.1 OpenClaw has a path traversal in browser upload allows local file read 2026-02-19
CVE-2026-32026 🔴 HIGH 7.1 OpenClaw < 2026.2.24 - Arbitrary File Read via Improper Temporary Path Validation in Sandbox 2026-03-19
CVE-2026-32976 🔴 HIGH 7.1 OpenClaw < 2026.3.11 - Account-Scoped configWrites Policy Bypass via Channel Commands 2026-03-31
CVE-2026-33581 🔴 HIGH 7.1 OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters 2026-03-31
CVE-2026-32979 🔴 HIGH 7 OpenClaw < 2026.3.11 - Unbound Interpreter and Runtime Commands Bypass in node-host Approval 2026-03-29
CVE-2026-22176 🟡 MEDIUM 6.9 OpenClaw < 2026.2.19 - Command Injection via Unescaped Environment Variables in Windows Scheduled Task Script Generation 2026-03-19
CVE-2026-22178 🟡 MEDIUM 6.9 OpenClaw < 2026.2.19 - ReDoS and Regex Injection via Unescaped Feishu Mention Metadata 2026-03-18
CVE-2026-27003 🟡 MEDIUM 6.9 OpenClaw: Telegram bot token exposure via logs 2026-02-19
CVE-2026-27488 🟡 MEDIUM 6.9 OpenClaw hardened cron webhook delivery against SSRF 2026-02-21
CVE-2026-27545 🟡 MEDIUM 6.9 OpenClaw < 2026.2.26 - Approval Bypass via Parent Symlink Current Working Directory Rebind 2026-03-18
CVE-2026-28394 🟡 MEDIUM 6.9 OpenClaw < 2026.2.15 - Denial of Service via Unbounded Response Parsing in web_fetch Tool 2026-03-05
CVE-2026-28480 🟡 MEDIUM 6.9 OpenClaw Telegram allowlist authorization accepted mutable usernames 2026-03-05
CVE-2026-31994 🟡 MEDIUM 6.9 OpenClaw < 2026.2.19 - Local Command Injection via Unsafe cmd Argument Handling in Windows Scheduled Task Script Generation 2026-03-19
CVE-2026-32975 🟡 MEDIUM 6.9 OpenClaw < 2026.3.12 - Weak Authorization via Mutable Group Names in Zalouser Allowlist 2026-03-29
CVE-2026-33576 🟡 MEDIUM 6.9 OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel 2026-03-31
CVE-2026-34510 🟡 MEDIUM 6.9 OpenClaw < 2026.3.22 - Remote File URL Acceptance in Windows Media Loaders 2026-04-01
CVE-2026-27008 🟡 MEDIUM 6.8 OpenClaw hardened the skill download target directory validation 2026-02-19
CVE-2026-29612 🟡 MEDIUM 6.8 OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding 2026-03-05
CVE-2026-32024 🟡 MEDIUM 6.8 OpenClaw < 2026.2.22 - Symlink Traversal in Avatar Handling 2026-03-19
CVE-2026-33572 🟡 MEDIUM 6.8 OpenClaw < 2026.2.17 - Insufficient File Permissions in Session Transcript Files 2026-03-29
CVE-2026-26972 🟡 MEDIUM 6.7 OpenClaw has a Path Traversal in Browser Download Functionality 2026-02-19
CVE-2026-28452 🟡 MEDIUM 6.7 OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) 2026-03-05
CVE-2026-25475 🟡 MEDIUM 6.5 OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction 2026-02-04
CVE-2026-26328 🟡 MEDIUM 6.5 OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities 2026-02-19
CVE-2026-28475 🟡 MEDIUM 6.3 OpenClaw < 2026.2.13 - Timing Attack via Hook Token Comparison 2026-03-05
CVE-2026-28449 🟡 MEDIUM 6.3 OpenClaw < 2026.2.25 - Webhook Replay Attack via Missing Durable Replay Suppression 2026-03-19
CVE-2026-32021 🟡 MEDIUM 6.3 OpenClaw < 2026.2.22 - Authorization Bypass via Display Name Collision in Feishu allowFrom 2026-03-19
CVE-2026-32028 🟡 MEDIUM 6.3 OpenClaw < 2026.2.25 - Missing Authorization Check in Discord DM Reaction Ingress 2026-03-19
CVE-2026-32050 🟡 MEDIUM 6.3 OpenClaw < 2026.2.25 - Unauthorized Reaction Status Event Enqueue via Access Check Bypass 2026-03-21
CVE-2026-32897 🟡 MEDIUM 6.3 OpenClaw < 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback 2026-03-21
CVE-2026-32896 🟡 MEDIUM 6.3 OpenClaw < 2026.2.21 - Unauthenticated Webhook Access via Passwordless Fallback in BlueBubbles Plugin 2026-03-21
CVE-2026-33580 🟡 MEDIUM 6.3 OpenClaw < 2026.3.28 - Brute Force Attack via Missing Rate Limiting on Webhook Shared Secret Authentication 2026-03-31
CVE-2026-22181 🟡 MEDIUM 6.1 OpenClaw < 2026.3.2 - DNS Pinning Bypass via Environment Proxy Configuration in web_fetch 2026-03-18
CVE-2026-32034 🟡 MEDIUM 6.1 OpenClaw < 2026.2.21 - Insecure Control UI Authentication over Plaintext HTTP 2026-03-19
CVE-2026-32022 🟡 MEDIUM 6 OpenClaw < 2026.2.21 - Arbitrary File Read via grep -e Flag Policy Bypass 2026-03-19
CVE-2026-32057 🟡 MEDIUM 6 OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter 2026-03-21
CVE-2026-22174 🟡 MEDIUM 5.9 OpenClaw < 2026.2.22 - Gateway Token Disclosure via Chrome CDP Probe 2026-03-18
CVE-2026-28481 🟡 MEDIUM 5.9 OpenClaw < 2026.2.1 - Bearer Token Leakage via MS Teams Attachment Downloader Suffix Matching 2026-03-05
CVE-2026-32043 🟡 MEDIUM 5.9 OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Parameter 2026-03-21
CVE-2026-32054 🟡 MEDIUM 5.9 OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling 2026-03-21
CVE-2026-22217 🟡 MEDIUM 5.8 OpenClaw 2026.2.22 < 2026.2.23 - Arbitrary Binary Execution via $SHELL Environment Variable Trusted Prefix Fallback 2026-03-18
CVE-2026-32035 🟡 MEDIUM 5.8 OpenClaw < 2026.3.2 - Missing Owner Flag Validation in Discord Voice Transcript Handler 2026-03-19
CVE-2026-29608 🟡 MEDIUM 5.4 OpenClaw 2026.3.1 < 2026.3.2 - Approval Integrity Bypass via system.run argv Rewriting 2026-03-19
CVE-2026-26326 🟡 MEDIUM 5.3 OpenClaw skills.status could leak secrets to operator.read clients 2026-02-19
CVE-2026-32001 🟡 MEDIUM 5.3 OpenClaw < 2026.2.22 - Node Role Device-Identity Bypass via WebSocket Authentication 2026-03-19
CVE-2026-32899 🟡 MEDIUM 5.3 OpenClaw < 2026.2.25 - Sender Policy Bypass in Slack Reaction and Pin Event Handlers 2026-03-21
CVE-2026-32923 🟡 MEDIUM 5.3 OpenClaw < 2026.3.11 - Authorization Bypass in Discord Guild Reaction Allowlist Enforcement 2026-03-29
CVE-2026-34425 🟡 MEDIUM 5.3 OpenClaw - Shell-Bleed Protection Preflight Validation Bypass 2026-04-02
CVE-2026-33578 🟡 MEDIUM 5.3 OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade 2026-03-31
CVE-2026-22180 🟡 MEDIUM 4.8 OpenClaw < 2026.3.2 - Path Confinement Bypass in Browser Output and File Write Operations 2026-03-18
CVE-2026-27576 🟡 MEDIUM 4.8 OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs 2026-02-21
CVE-2026-27486 🟡 MEDIUM 4.3 OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup 2026-02-21
CVE-2026-24764 🟢 LOW 3.7 OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions 2026-02-19
CVE-2026-27183 🟢 LOW 2.1 OpenClaw < 2026.3.7 - Shell Approval Gating Bypass via Dispatch Wrapper Depth Mismatch 2026-03-23
CVE-2026-31991 🟢 LOW 2 OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Leakage in Signal Group Allowlist 2026-03-19
CVE-2026-32970 🟢 LOW 2 OpenClaw < 2026.3.11 - Credential Fallback Logic Bypass via Unavailable Local Auth SecretRefs 2026-03-31

🔄 CVE 发布流水线

16/16 已发布
CVE ID状态CNAGHSA 发布日期cvelistV5
CVE-2026-24763 ✅ PUBLISHED GitHub_M 2026-02-02 ✅ 已收录
CVE-2026-25157 ✅ PUBLISHED GitHub_M 2026-02-02 ✅ 已收录
CVE-2026-25253 ✅ PUBLISHED mitre 2026-02-02 ✅ 已收录
CVE-2026-26317 ✅ PUBLISHED GitHub_M 2026-02-18 ✅ 已收录
CVE-2026-26328 ✅ PUBLISHED GitHub_M 2026-02-18 ✅ 已收录
CVE-2026-28452 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28458 ✅ PUBLISHED VulnCheck 2026-02-17 ✅ 已收录
CVE-2026-28469 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28478 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-28480 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-29612 ✅ PUBLISHED VulnCheck 2026-02-18 ✅ 已收录
CVE-2026-33576 ✅ PUBLISHED VulnCheck 2026-03-31 ✅ 已收录
CVE-2026-33577 ✅ PUBLISHED VulnCheck 2026-04-01 ✅ 已收录
CVE-2026-33578 ✅ PUBLISHED VulnCheck 2026-04-01 ✅ 已收录
CVE-2026-33581 ✅ PUBLISHED VulnCheck 2026-03-31 ✅ 已收录
CVE-2026-34503 ✅ PUBLISHED VulnCheck 2026-03-31 ✅ 已收录
CVE-2026-33581 ✅ PUBLISHED | [GHSA-2pr2-hcv6-7gwv](https://github.com/advisories/GHSA-2pr2-hcv6-7gwv) 2026-03-31 ✅ 已收录
CVE-2026-28469 ✅ PUBLISHED | [GHSA-3fqr-4cg8-h96q](https://github.com/advisories/GHSA-3fqr-4cg8-h96q) 2026-02-18 ✅ 已收录
CVE-2026-28478 ✅ PUBLISHED | [GHSA-mr32-vwc2-5j6h](https://github.com/advisories/GHSA-mr32-vwc2-5j6h) 2026-02-18 ✅ 已收录
CVE-2026-25157 ✅ PUBLISHED | [GHSA-g8p2-7wf7-98mq](https://github.com/advisories/GHSA-g8p2-7wf7-98mq) 2026-02-02 ✅ 已收录
CVE-2026-24763 ✅ PUBLISHED | [GHSA-r2c6-8jc8-g32w](https://github.com/advisories/GHSA-r2c6-8jc8-g32w) 2026-02-02 ✅ 已收录
CVE-2026-33578 ✅ PUBLISHED | [GHSA-2x4x-cc5g-qmmg](https://github.com/advisories/GHSA-2x4x-cc5g-qmmg) 2026-04-01 ✅ 已收录
CVE-2026-33576 ✅ PUBLISHED | [GHSA-9528-x887-j2fp](https://github.com/advisories/GHSA-9528-x887-j2fp) 2026-03-31 ✅ 已收录
CVE-2026-28480 ✅ PUBLISHED | [GHSA-h89v-j3x9-8wqj](https://github.com/advisories/GHSA-h89v-j3x9-8wqj) 2026-02-18 ✅ 已收录
CVE-2026-29612 ✅ PUBLISHED | [GHSA-g34w-4xqq-h79m](https://github.com/advisories/GHSA-g34w-4xqq-h79m) 2026-02-18 ✅ 已收录

📢 安全公告精选

139+
GHSA-9p3r-hh9 CRITICAL
OpenClaw: Sandbox escape via TOCTOU race in remote FS bridge readFile
2026-04-03
GHSA-g5cg-8x5 CRITICAL
OpenClaw: Heartbeat context inheritance bypasses sandbox via senderIsOwner escalation
2026-04-02
GHSA-8rh7-677 CRITICAL
OpenClaw has a CWD `.env` environment variable injection which bypasses host-env policy and allows config takeover
2026-04-01
GHSA-j7p2-qcw CRITICAL
OpenClaw's incomplete host env sanitization blocklist allows supply-chain redirection via package-manager env overrides
2026-03-31
GHSA-hh43-q69 CRITICAL
Duplicate Advisory: `OpenClaw: session_status` let sandboxed subagents access parent or sibling session state
2026-03-29
OpenClaw: macOS Tailnet DNS Spoofing & Credential Exfiltration
2026-04-03
OpenClaw: Unbound bootstrap setup codes allow privilege escalation during pairing
2026-04-03
OpenClaw: Node browser proxy `allowProfiles` bypass through persistent profile mutation and runtime profile selection
2026-04-03
OpenClaw: Paired node escalates to gateway RCE via unrestricted node.event agent dispatch
2026-04-03
OpenClaw: Incomplete scope-clearing fix allows operator.admin escalation via trusted-proxy auth mode
2026-04-03
OpenClaw: Media Parsing Path Traversal Leads to Arbitrary File Read
2026-04-03
OpenClaw: Agentic Consent Bypass — LLM Agent Can Silently Disable Exec Approval via `config.patch`
2026-04-03

📊 漏洞分类

白名单绕过 (Allowlist Bypass)
60
注入攻击 (XSS/CSRF/Prompt/Command)
34
认证绕过 / 缺失认证
10
SSRF
5
拒绝服务 (DoS)
6
路径穿越 (CWE-22)
3
原型污染 (Prototype Pollution)
1

💡 关键洞察

📈
7.1
平均 CVSS 评分
🔴
344%
HIGH 及以上漏洞占比
100%
CVE 已发布到 cvelistV5
🛡️
100%
已提供修复版本
🏢
3
CNA 来源 (VulnCheck / GitHub / MITRE)
📦
npm
受影响包 (openclaw)