| CVE-2026-22172 |
🟣 CRITICAL |
9.4 |
OpenClaw < 2026.3.12 - Scope Elevation in WebSocket Shared-Auth Connections |
2026-03-20 |
| CVE-2026-32922 |
🟣 CRITICAL |
9.4 |
OpenClaw < 2026.3.11 - Privilege Escalation via Unvalidated Scope in device.token.rotate |
2026-03-29 |
| CVE-2026-32915 |
🟣 CRITICAL |
9.3 |
OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Subagent Control Surface |
2026-03-29 |
| CVE-2026-32987 |
🟣 CRITICAL |
9.3 |
OpenClaw < 2026.3.13 - Bootstrap Setup Code Replay via Device Pairing |
2026-03-29 |
| CVE-2026-32918 |
🟣 CRITICAL |
9.2 |
OpenClaw < 2026.3.11 - Session Sandbox Escape via session_status Tool |
2026-03-29 |
| CVE-2026-32916 |
🟣 CRITICAL |
9.2 |
OpenClaw 2026.3.7 < 2026.3.11 - Authorization Bypass in Plugin Subagent Routes via Synthetic Admin Scopes |
2026-03-31 |
| CVE-2026-24763 |
🔴 HIGH |
8.8 |
OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable |
2026-02-02 |
| CVE-2026-25253 |
🔴 HIGH |
8.8 |
OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl |
2026-02-01 |
| CVE-2026-32974 |
🔴 HIGH |
8.8 |
OpenClaw < 2026.3.12 - Forged Event Injection via Feishu Webhook Verification Token |
2026-03-29 |
| CVE-2026-28462 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths |
2026-03-05 |
| CVE-2026-28478 |
🔴 HIGH |
8.7 |
OpenClaw affected by denial of service via unbounded webhook request body buffering |
2026-03-05 |
| CVE-2026-28479 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration |
2026-03-05 |
| CVE-2026-29609 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media Fetch |
2026-03-05 |
| CVE-2026-32011 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing |
2026-03-19 |
| CVE-2026-32013 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods |
2026-03-19 |
| CVE-2026-32049 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass |
2026-03-21 |
| CVE-2026-32059 |
🔴 HIGH |
8.7 |
OpenClaw 2026.2.22-2 < 2026.2.23 - Allowlist Bypass via sort Long-Option Abbreviation in tools.exec.safeBins |
2026-03-11 |
| CVE-2026-32062 |
🔴 HIGH |
8.7 |
OpenClaw 2026.2.21-2 < 2026.2.22 - Unauthenticated WebSocket Resource Exhaustion via Media Stream |
2026-03-11 |
| CVE-2026-32846 |
🔴 HIGH |
8.7 |
OpenClaw Media Parsing Path Traversal to Arbitrary File Read |
2026-03-26 |
| CVE-2026-32982 |
🔴 HIGH |
8.7 |
OpenClaw < 2026.3.13 - Telegram Bot Token Exposure in Media Fetch Error Logs |
2026-03-31 |
| CVE-2026-26323 |
🔴 HIGH |
8.6 |
OpenClaw has a command injection in maintainer clawtributors updater |
2026-02-19 |
| CVE-2026-32014 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields |
2026-03-19 |
| CVE-2026-32920 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.3.12 - Arbitrary Code Execution via Auto-Discovery of Workspace Plugins |
2026-03-31 |
| CVE-2026-33575 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.3.12 - Long-lived Credential Exposure in Pairing Setup Codes |
2026-03-29 |
| CVE-2026-33577 |
🔴 HIGH |
8.6 |
OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve |
2026-03-31 |
| CVE-2026-34503 |
🔴 HIGH |
8.6 |
OpenClaw's device removal and token revocation do not terminate active WebSocket sessions |
2026-03-31 |
| CVE-2026-28468 |
🔴 HIGH |
8.5 |
OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server |
2026-03-05 |
| CVE-2026-32064 |
🔴 HIGH |
8.5 |
OpenClaw < 2026.2.21 - Missing VNC Authentication in Sandbox Browser noVNC Observer |
2026-03-21 |
| CVE-2026-28453 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction |
2026-03-05 |
| CVE-2026-28393 |
🔴 HIGH |
8.3 |
OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal |
2026-03-05 |
| CVE-2026-28450 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.2.12 - Unauthenticated Profile Tampering via Nostr Plugin HTTP Endpoints |
2026-03-05 |
| CVE-2026-32004 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.3.2 - Authentication Bypass via Encoded Path in /api/channels Route |
2026-03-19 |
| CVE-2026-32036 |
🔴 HIGH |
8.3 |
OpenClaw < 2026.2.26- Authentication Bypass via Encoded Dot-Segment Traversal in /api/channels |
2026-03-19 |
| CVE-2026-28464 |
🔴 HIGH |
8.2 |
OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication |
2026-03-05 |
| CVE-2026-28454 |
🔴 HIGH |
8.2 |
OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram Webhook |
2026-03-05 |
| CVE-2026-28465 |
🔴 HIGH |
8.2 |
OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers |
2026-03-05 |
| CVE-2026-28469 |
🔴 HIGH |
8.2 |
OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting |
2026-03-05 |
| CVE-2026-32302 |
🔴 HIGH |
8.1 |
OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode |
2026-03-12 |
| CVE-2026-25157 |
🔴 HIGH |
7.8 |
OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand |
2026-02-04 |
| CVE-2026-32048 |
🔴 HIGH |
7.7 |
OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn |
2026-03-21 |
| CVE-2026-27487 |
🔴 HIGH |
7.6 |
OpenClaw: Prevent shell injection in macOS keychain credential write |
2026-02-21 |
| CVE-2026-32005 |
🔴 HIGH |
7.6 |
OpenClaw < 2026.2.25 - Authorization Bypass in Interactive Callbacks via Sender Check Skip |
2026-03-19 |
| CVE-2026-26316 |
🔴 HIGH |
7.5 |
OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust |
2026-02-19 |
| CVE-2026-22179 |
🔴 HIGH |
7.5 |
OpenClaw < 2026.2.22 - Allowlist Bypass via Command Substitution in system.run |
2026-03-18 |
| CVE-2026-26321 |
🔴 HIGH |
7.5 |
OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension |
2026-02-19 |
| CVE-2026-25474 |
🔴 HIGH |
7.5 |
OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret`) → auth bypass |
2026-02-19 |
| CVE-2026-26324 |
🔴 HIGH |
7.5 |
OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) |
2026-02-19 |
| CVE-2026-28485 |
🔴 HIGH |
7.5 |
OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints |
2026-03-05 |
| CVE-2026-32003 |
🔴 HIGH |
7.5 |
OpenClaw < 2026.2.22 - Remote Code Execution via SHELLOPTS/PS4 Environment Injection in system.run |
2026-03-19 |
| CVE-2026-28458 |
🔴 HIGH |
7.4 |
OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access |
2026-03-05 |
| CVE-2026-32016 |
🔴 HIGH |
7.3 |
OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS |
2026-03-19 |
| CVE-2026-32032 |
🔴 HIGH |
7.3 |
OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variable |
2026-03-19 |
| CVE-2026-26325 |
🔴 HIGH |
7.2 |
OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals |
2026-02-19 |
| CVE-2026-22175 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.23 - Exec Approval Bypass via Unrecognized Multiplexer Shell Wrappers |
2026-03-18 |
| CVE-2026-26317 |
🔴 HIGH |
7.1 |
OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints |
2026-02-19 |
| CVE-2026-26327 |
🔴 HIGH |
7.1 |
OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning |
2026-02-19 |
| CVE-2026-27566 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.22 - Allowlist Bypass via Wrapper Binary Unwrapping in system.run |
2026-03-19 |
| CVE-2026-32008 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.2.21 - Arbitrary Local File Read via Browser Navigation Guard |
2026-03-19 |
| CVE-2026-33581 |
🔴 HIGH |
7.1 |
OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters |
2026-03-31 |
| CVE-2026-32009 |
🔴 HIGH |
7 |
OpenClaw < 2026.2.24 - Binary Hijacking via Static Default Trusted Directories in safeBins |
2026-03-19 |
| CVE-2026-32979 |
🔴 HIGH |
7 |
OpenClaw < 2026.3.11 - Unbound Interpreter and Runtime Commands Bypass in node-host Approval |
2026-03-29 |
| CVE-2026-22177 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars |
2026-03-18 |
| CVE-2026-27523 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.2.24 - Sandbox Bind Validation Bypass via Symlink-Parent Missing-Leaf Paths |
2026-03-18 |
| CVE-2026-31990 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.2 - Symlink Traversal in stageSandboxMedia Destination |
2026-03-19 |
| CVE-2026-28480 |
🟡 MEDIUM |
6.9 |
OpenClaw Telegram allowlist authorization accepted mutable usernames |
2026-03-05 |
| CVE-2026-32919 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.11 - Unauthorized Session Reset via agent Slash Commands |
2026-03-29 |
| CVE-2026-34505 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.12 - Webhook Rate Limiting Bypass via Pre-Authentication Secret Validation |
2026-03-31 |
| CVE-2026-34504 |
🟡 MEDIUM |
6.9 |
OpenClaw affected by SSRF via unguarded image download in fal provider |
2026-03-31 |
| CVE-2026-34510 |
🟡 MEDIUM |
6.9 |
OpenClaw < 2026.3.22 - Remote File URL Acceptance in Windows Media Loaders |
2026-04-01 |
| CVE-2026-29612 |
🟡 MEDIUM |
6.8 |
OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding |
2026-03-05 |
| CVE-2026-28452 |
🟡 MEDIUM |
6.7 |
OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) |
2026-03-05 |
| CVE-2026-26328 |
🟡 MEDIUM |
6.5 |
OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities |
2026-02-19 |
| CVE-2026-28448 |
🟡 MEDIUM |
6.3 |
OpenClaw 2026.1.29 < 2026.2.1 - Authorization Bypass in Twitch Plugin allowFrom Access Control |
2026-03-05 |
| CVE-2026-28451 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching |
2026-03-05 |
| CVE-2026-28471 |
🟡 MEDIUM |
6.3 |
OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin |
2026-03-05 |
| CVE-2026-28475 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.13 - Timing Attack via Hook Token Comparison |
2026-03-05 |
| CVE-2026-32028 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.25 - Missing Authorization Check in Discord DM Reaction Ingress |
2026-03-19 |
| CVE-2026-32031 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.26 - Authentication Bypass via Path Canonicalization Mismatch in /api/channels Gateway |
2026-03-19 |
| CVE-2026-32029 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.21 - Client IP Spoofing via X-Forwarded-For Header Parsing |
2026-03-19 |
| CVE-2026-32050 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.25 - Unauthorized Reaction Status Event Enqueue via Access Check Bypass |
2026-03-21 |
| CVE-2026-32897 |
🟡 MEDIUM |
6.3 |
OpenClaw < 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback |
2026-03-21 |
| CVE-2026-33580 |
🟡 MEDIUM |
6.3 |
OpenClaw's Nextcloud Talk webhook missing rate limiting on shared secret authentication |
2026-03-31 |
| CVE-2026-22181 |
🟡 MEDIUM |
6.1 |
OpenClaw < 2026.3.2 - DNS Pinning Bypass via Environment Proxy Configuration in web_fetch |
2026-03-18 |
| CVE-2026-32002 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.2.23 - Sandbox Boundary Bypass via Image Tool workspaceOnly Bypass |
2026-03-19 |
| CVE-2026-32039 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.2.22 - Sender Authorization Bypass via Identity Collision in toolsBySender |
2026-03-19 |
| CVE-2026-32057 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter |
2026-03-21 |
| CVE-2026-34511 |
🟡 MEDIUM |
6 |
OpenClaw < 2026.4.2 - PKCE Verifier Exposure via OAuth State Parameter |
2026-04-03 |
| CVE-2026-28481 |
🟡 MEDIUM |
5.9 |
OpenClaw < 2026.2.1 - Bearer Token Leakage via MS Teams Attachment Downloader Suffix Matching |
2026-03-05 |
| CVE-2026-32043 |
🟡 MEDIUM |
5.9 |
OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Parameter |
2026-03-21 |
| CVE-2026-22217 |
🟡 MEDIUM |
5.8 |
OpenClaw 2026.2.22 < 2026.2.23 - Arbitrary Binary Execution via $SHELL Environment Variable Trusted Prefix Fallback |
2026-03-18 |
| CVE-2026-27670 |
🟡 MEDIUM |
5.8 |
OpenClaw < 2026.3.2 - Arbitrary File Write via ZIP Extraction Parent Symlink Race Condition |
2026-03-19 |
| CVE-2026-32065 |
🟡 MEDIUM |
5.7 |
OpenClaw < 2026.2.25 - Approval Identity Mismatch in system.run Command Execution |
2026-03-21 |
| CVE-2026-28457 |
🟡 MEDIUM |
5.6 |
OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter |
2026-03-05 |
| CVE-2026-31993 |
🟡 MEDIUM |
5.6 |
OpenClaw < 2026.2.22 - Allowlist Parsing Mismatch in system.run Shell Chains |
2026-03-19 |
| CVE-2026-32898 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata |
2026-03-21 |
| CVE-2026-32923 |
🟡 MEDIUM |
5.3 |
OpenClaw < 2026.3.11 - Authorization Bypass in Discord Guild Reaction Allowlist Enforcement |
2026-03-29 |
| CVE-2026-34425 |
🟡 MEDIUM |
5.3 |
OpenClaw - Shell-Bleed Protection Preflight Validation Bypass |
2026-04-02 |
| CVE-2026-33578 |
🟡 MEDIUM |
5.3 |
OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade |
2026-03-31 |
| CVE-2026-22180 |
🟡 MEDIUM |
4.8 |
OpenClaw < 2026.3.2 - Path Confinement Bypass in Browser Output and File Write Operations |
2026-03-18 |
| CVE-2026-24764 |
🟢 LOW |
3.7 |
OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions |
2026-02-19 |
| CVE-2026-27524 |
🟢 LOW |
2.3 |
OpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path |
2026-03-18 |
| CVE-2026-32019 |
🟢 LOW |
2.3 |
OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard |
2026-03-19 |
| CVE-2026-32006 |
🟢 LOW |
2.3 |
OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Fallback in Group Allowlist |
2026-03-19 |
| CVE-2026-34506 |
🟢 LOW |
2.3 |
OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlist Configuration |
2026-03-31 |
| CVE-2026-31991 |
🟢 LOW |
2 |
OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Leakage in Signal Group Allowlist |
2026-03-19 |
| CVE-2026-32018 |
🟢 LOW |
2 |
OpenClaw < 2026.2.19 - Race Condition in Sandbox Registry Write Operations |
2026-03-19 |
| CVE-2026-32058 |
🟢 LOW |
2 |
OpenClaw < 2026.2.26 - Approval Context-Binding Weakness in system.run via host=node |
2026-03-21 |
| CVE-2026-32067 |
🟢 LOW |
2 |
OpenClaw < 2026.2.26 - Cross-Account Authorization Bypass in DM Pairing Store |
2026-03-21 |
| CVE-2026-32970 |
🟢 LOW |
2 |
OpenClaw < 2026.3.11 - Credential Fallback Logic Bypass via Unavailable Local Auth SecretRefs |
2026-03-31 |