安全漏洞追踪面板 — 基于 cvelistV5 + GitHub Advisory Database 数据
| CVE ID | 严重性 | CVSS | 漏洞描述 | 发布日期 |
|---|---|---|---|---|
| CVE-2026-43534 | 🟣 CRITICAL | 9.3 | OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events | 2026-05-05 |
| CVE-2026-44109 | 🟣 CRITICAL | 9.2 | OpenClaw: Feishu webhook and card-action validation now fail closed | 2026-05-06 |
| CVE-2026-43585 | 🟣 CRITICAL | 9.2 | OpenClaw: Gateway HTTP endpoints re-resolve bearer auth after SecretRef rotation | 2026-05-06 |
| CVE-2026-43533 | 🔴 HIGH | 8.9 | OpenClaw < 2026.4.10 - Arbitrary Local File Read via QQBot Media Tags | 2026-05-05 |
| CVE-2026-25253 | 🔴 HIGH | 8.8 | OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl | 2026-02-01 |
| CVE-2026-24763 | 🔴 HIGH | 8.8 | OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable | 2026-02-02 |
| CVE-2026-28478 | 🔴 HIGH | 8.7 | OpenClaw affected by denial of service via unbounded webhook request body buffering | 2026-03-05 |
| CVE-2026-42435 | 🔴 HIGH | 8.7 | OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms | 2026-05-05 |
| CVE-2026-43530 | 🔴 HIGH | 8.7 | OpenClaw: busybox and toybox applet execution weakened exec approval binding | 2026-05-05 |
| CVE-2026-42434 | 🔴 HIGH | 8.7 | OpenClaw: Sandboxed agents could escape exec routing via host=node override | 2026-05-05 |
| CVE-2026-43584 | 🔴 HIGH | 8.7 | OpenClaw < 2026.4.10 - Insufficient Environment Variable Denylist in Exec Policy | 2026-05-06 |
| CVE-2026-44118 | 🔴 HIGH | 8.5 | OpenClaw < 2026.4.22 - Owner Context Spoofing via Bearer Token Header | 2026-05-06 |
| CVE-2026-44114 | 🔴 HIGH | 8.5 | OpenClaw: Workspace dotenv could override runtime-control environment variables | 2026-05-06 |
| CVE-2026-43526 | 🔴 HIGH | 8.3 | OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes | 2026-05-05 |
| CVE-2026-28469 | 🔴 HIGH | 8.2 | OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting | 2026-03-05 |
| CVE-2026-25157 | 🔴 HIGH | 7.8 | OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand | 2026-02-04 |
| CVE-2026-43571 | 🔴 HIGH | 7.7 | OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows | 2026-05-05 |
| CVE-2026-43569 | 🔴 HIGH | 7.7 | OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins | 2026-05-05 |
| CVE-2026-44110 | 🔴 HIGH | 7.7 | OpenClaw: Matrix room control-command authorization no longer trusts DM pairing-store entries | 2026-05-06 |
| CVE-2026-28458 | 🔴 HIGH | 7.4 | OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access | 2026-03-05 |
| CVE-2026-26317 | 🔴 HIGH | 7.1 | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | 2026-02-19 |
| CVE-2026-42433 | 🔴 HIGH | 7.1 | OpenClaw: Matrix profile config persistence was reachable from operator.write message tools | 2026-05-05 |
| CVE-2026-43568 | 🔴 HIGH | 7.1 | OpenClaw: Memory dreaming config persistence was reachable from operator.write commands | 2026-05-05 |
| CVE-2026-43567 | 🔴 HIGH | 7.1 | OpenClaw < 2026.4.10 - Path Traversal in screen_record outPath Parameter | 2026-05-05 |
| CVE-2026-43531 | 🔴 HIGH | 7 | OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File | 2026-05-05 |
| CVE-2026-28480 | 🟡 MEDIUM | 6.9 | OpenClaw Telegram allowlist authorization accepted mutable usernames | 2026-03-05 |
| CVE-2026-44116 | 🟡 MEDIUM | 6.9 | OpenClaw < 2026.4.22 - Server-Side Request Forgery in Zalo Photo URL Validation | 2026-05-06 |
| CVE-2026-29612 | 🟡 MEDIUM | 6.8 | OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding | 2026-03-05 |
| CVE-2026-28452 | 🟡 MEDIUM | 6.7 | OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) | 2026-03-05 |
| CVE-2026-26328 | 🟡 MEDIUM | 6.5 | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities | 2026-02-19 |
| CVE-2026-41389 | 🟡 MEDIUM | 6.3 | OpenClaw: Webchat media embedding enforces local-root containment for tool-result files | 2026-04-20 |
| CVE-2026-43527 | 🟡 MEDIUM | 6.3 | OpenClaw: Browser SSRF policy default allowed private-network navigation | 2026-05-05 |
| CVE-2026-43572 | 🟡 MEDIUM | 6.3 | OpenClaw: Microsoft Teams SSO invoke handler missed sender authorization checks | 2026-05-05 |
| CVE-2026-44117 | 🟡 MEDIUM | 6.3 | OpenClaw < 2026.4.20 - Server-Side Request Forgery in QQBot Direct Media Upload | 2026-05-06 |
| CVE-2026-43570 | 🟡 MEDIUM | 6 | OpenClaw contains a symlink traversal vulnerability | 2026-05-05 |
| CVE-2026-43583 | 🟡 MEDIUM | 6 | OpenClaw: Delivery queue recovery could lose group tool-policy context for media replay | 2026-05-06 |
| CVE-2026-43574 | 🟡 MEDIUM | 6 | OpenClaw < 2026.4.12 - Improper Authorization via Empty Approver Lists | 2026-05-05 |
| CVE-2026-44112 | 🟡 MEDIUM | 6 | OpenClaw < 2026.4.22 - Symlink Swap Race Condition in OpenShell FS Bridge Writes | 2026-05-06 |
| CVE-2026-44113 | 🟡 MEDIUM | 6 | OpenClaw: OpenShell FS bridge reads pin and verify the opened file before returning bytes | 2026-05-06 |
| CVE-2026-42438 | 🟡 MEDIUM | 4.9 | OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure | 2026-05-05 |
| CVE-2026-42439 | 🟡 MEDIUM | 4.9 | OpenClaw < 2026.4.10 - SSRF Policy Bypass in Browser Tabs Action Routes | 2026-05-05 |
| CVE-2026-43532 | 🟡 MEDIUM | 4.9 | OpenClaw: Discord event cover images bypassed sandbox media normalization | 2026-05-05 |
| CVE-2026-43582 | 🟡 MEDIUM | 4.9 | OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname Validation Bypass | 2026-05-06 |
| CVE-2026-43576 | 🟡 MEDIUM | 4.9 | OpenClaw < 2026.4.5 - Second-hop SSRF via CDP /json/version WebSocket URL | 2026-05-06 |
| CVE-2026-43573 | 🟡 MEDIUM | 4.9 | OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement | 2026-05-05 |
| CVE-2026-43580 | 🟡 MEDIUM | 4.9 | OpenClaw: Browser press/type interaction routes missed complete navigation guard coverage | 2026-05-06 |
| CVE-2026-41358 | 🟢 LOW | 2.3 | OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context | 2026-04-23 |
| CVE-2026-41908 | 🟢 LOW | 2.3 | OpenClaw < 2026.4.20 - Scope Enforcement Bypass in Assistant-Media Route | 2026-04-23 |
| CVE ID | 状态 | CNA | GHSA 发布日期 | cvelistV5 |
|---|---|---|---|---|
| CVE-2026-24763 | ✅ PUBLISHED | GitHub_M | 2026-02-02 | ✅ 已收录 |
| CVE-2026-25157 | ✅ PUBLISHED | GitHub_M | 2026-02-02 | ✅ 已收录 |
| CVE-2026-25253 | ✅ PUBLISHED | mitre | 2026-02-02 | ✅ 已收录 |
| CVE-2026-26317 | ✅ PUBLISHED | GitHub_M | 2026-02-18 | ✅ 已收录 |
| CVE-2026-26328 | ✅ PUBLISHED | GitHub_M | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28452 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28458 | ✅ PUBLISHED | VulnCheck | 2026-02-17 | ✅ 已收录 |
| CVE-2026-28469 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28478 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28480 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-29612 | ✅ PUBLISHED | VulnCheck | 2026-02-18 | ✅ 已收录 |
| CVE-2026-41358 | ✅ PUBLISHED | VulnCheck | 2026-05-04 | ✅ 已收录 |
| CVE-2026-41389 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-41908 | ✅ PUBLISHED | VulnCheck | 2026-04-25 | ✅ 已收录 |
| CVE-2026-42433 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42434 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42435 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42438 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42439 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43526 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43527 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43530 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43531 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43532 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43533 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43534 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43567 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43568 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43569 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43570 | ✅ PUBLISHED | VulnCheck | 2026-05-05 | ✅ 已收录 |
| CVE-2026-43571 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43572 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43573 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43574 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43576 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43580 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43582 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43583 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43584 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43585 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-44109 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-44110 | ✅ PUBLISHED | VulnCheck | 2026-04-17 | ✅ 已收录 |
| CVE-2026-44112 | ✅ PUBLISHED | VulnCheck | 2026-05-04 | ✅ 已收录 |
| CVE-2026-44113 | ✅ PUBLISHED | VulnCheck | 2026-05-04 | ✅ 已收录 |
| CVE-2026-44114 | ✅ PUBLISHED | VulnCheck | 2026-04-25 | ✅ 已收录 |
| CVE-2026-44116 | ✅ PUBLISHED | VulnCheck | 2026-05-04 | ✅ 已收录 |
| CVE-2026-44117 | ✅ PUBLISHED | VulnCheck | 2026-04-25 | ✅ 已收录 |
| CVE-2026-44118 | ✅ PUBLISHED | VulnCheck | 2026-05-04 | ✅ 已收录 |
| CVE-2026-44118 | ✅ PUBLISHED | | [GHSA-5mh4-3rv3-fpcf](https://github.com/advisories/GHSA-5mh4-3rv3-fpcf) | 2026-05-04 | ✅ 已收录 |
| CVE-2026-44114 | ✅ PUBLISHED | | [GHSA-394x-274p-mqc6](https://github.com/advisories/GHSA-394x-274p-mqc6) | 2026-04-25 | ✅ 已收录 |
| CVE-2026-44109 | ✅ PUBLISHED | | [GHSA-2gvc-4f3c-2855](https://github.com/advisories/GHSA-2gvc-4f3c-2855) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43585 | ✅ PUBLISHED | | [GHSA-66r7-m7xm-v49h](https://github.com/advisories/GHSA-66r7-m7xm-v49h) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43530 | ✅ PUBLISHED | | [GHSA-7jp6-r74r-995q](https://github.com/advisories/GHSA-7jp6-r74r-995q) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42434 | ✅ PUBLISHED | | [GHSA-939r-rj45-g2rj](https://github.com/advisories/GHSA-939r-rj45-g2rj) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43571 | ✅ PUBLISHED | | [GHSA-vfp4-8x56-j7c5](https://github.com/advisories/GHSA-vfp4-8x56-j7c5) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-28469 | ✅ PUBLISHED | | [GHSA-3fqr-4cg8-h96q](https://github.com/advisories/GHSA-3fqr-4cg8-h96q) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-28478 | ✅ PUBLISHED | | [GHSA-mr32-vwc2-5j6h](https://github.com/advisories/GHSA-mr32-vwc2-5j6h) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-25157 | ✅ PUBLISHED | | [GHSA-g8p2-7wf7-98mq](https://github.com/advisories/GHSA-g8p2-7wf7-98mq) | 2026-02-02 | ✅ 已收录 |
| CVE-2026-24763 | ✅ PUBLISHED | | [GHSA-r2c6-8jc8-g32w](https://github.com/advisories/GHSA-r2c6-8jc8-g32w) | 2026-02-02 | ✅ 已收录 |
| CVE-2026-43570 | ✅ PUBLISHED | | [GHSA-q8ff-7ffm-m3r9](https://github.com/advisories/GHSA-q8ff-7ffm-m3r9) | 2026-05-05 | ✅ 已收录 |
| CVE-2026-44113 | ✅ PUBLISHED | | [GHSA-wppj-c6mr-83jj](https://github.com/advisories/GHSA-wppj-c6mr-83jj) | 2026-05-04 | ✅ 已收录 |
| CVE-2026-44116 | ✅ PUBLISHED | | [GHSA-93rg-2xm5-2p9v](https://github.com/advisories/GHSA-93rg-2xm5-2p9v) | 2026-05-04 | ✅ 已收录 |
| CVE-2026-44117 | ✅ PUBLISHED | | [GHSA-7jm2-g593-4qrc](https://github.com/advisories/GHSA-7jm2-g593-4qrc) | 2026-04-25 | ✅ 已收录 |
| CVE-2026-41389 | ✅ PUBLISHED | | [GHSA-f7fh-qg34-x2xh](https://github.com/advisories/GHSA-f7fh-qg34-x2xh) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42438 | ✅ PUBLISHED | | [GHSA-536q-mj95-h29h](https://github.com/advisories/GHSA-536q-mj95-h29h) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43573 | ✅ PUBLISHED | | [GHSA-rj2p-j66c-mgqh](https://github.com/advisories/GHSA-rj2p-j66c-mgqh) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43567 | ✅ PUBLISHED | | [GHSA-53vx-pmqw-863c](https://github.com/advisories/GHSA-53vx-pmqw-863c) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43582 | ✅ PUBLISHED | | [GHSA-2767-2q9v-9326](https://github.com/advisories/GHSA-2767-2q9v-9326) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43531 | ✅ PUBLISHED | | [GHSA-c9h3-5p7r-mrjh](https://github.com/advisories/GHSA-c9h3-5p7r-mrjh) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-43574 | ✅ PUBLISHED | | [GHSA-7g8c-cfr3-vqqr](https://github.com/advisories/GHSA-7g8c-cfr3-vqqr) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-42435 | ✅ PUBLISHED | | [GHSA-5gjc-grvm-m88j](https://github.com/advisories/GHSA-5gjc-grvm-m88j) | 2026-04-17 | ✅ 已收录 |
| CVE-2026-28480 | ✅ PUBLISHED | | [GHSA-h89v-j3x9-8wqj](https://github.com/advisories/GHSA-h89v-j3x9-8wqj) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-29612 | ✅ PUBLISHED | | [GHSA-g34w-4xqq-h79m](https://github.com/advisories/GHSA-g34w-4xqq-h79m) | 2026-02-18 | ✅ 已收录 |
| CVE-2026-41358 | ✅ PUBLISHED | | [GHSA-v8qf-fr4g-28p2](https://github.com/advisories/GHSA-v8qf-fr4g-28p2) | 2026-05-04 | ✅ 已收录 |
| CVE-2026-43572 | ✅ PUBLISHED | | [GHSA-r77c-2cmr-7p47](https://github.com/advisories/GHSA-r77c-2cmr-7p47) | 2026-04-17 | ✅ 已收录 |