CWE-696

Incorrect Behavior Order

14 CVEs Avg CVSS 6.1 MITRE
0
CRITICAL
3
HIGH
10
MEDIUM
1
LOW
0
POC
0
KEV

Monthly

CVE-2026-35652 MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 suffers from an authorization bypass in its interactive callback dispatch mechanism that permits unauthenticated remote attackers to execute action handlers without sender allowlist validation. The vulnerability exploits a race condition or timing gap where callbacks are processed before security checks complete, enabling unauthorized state modification and availability impact. No public exploit code or active exploitation has been confirmed at time of analysis, but the low attack complexity and lack of authentication requirements make this a practical threat to exposed OpenClaw deployments.

Authentication Bypass
NVD GitHub
CVSS 4.0
6.9
EPSS
0.0%
CVE-2026-40223 MEDIUM This Month

Local denial of service in systemd 258 through 259 allows unprivileged users to trigger an assertion failure by interacting with service units configured with Delegate=yes and no explicit User setting, causing the systemd daemon to crash. The vulnerability requires local access and specific unit configuration but poses moderate risk to system availability with a CVSS score of 4.7 and no active exploitation currently identified.

Information Disclosure
NVD GitHub
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-35640 MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 processes JSON webhook request bodies before validating cryptographic signatures, allowing unauthenticated remote attackers to trigger denial of service by submitting malicious webhook payloads that force computationally expensive JSON parsing operations. The vulnerability exploits a logic-ordering defect where signature validation occurs after resource-intensive parsing, enabling attackers to exhaust server resources without valid credentials. No public exploit code has been identified at the time of analysis, though the attack requires only network access and is trivially exploitable.

Denial Of Service Openclaw
NVD GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2026-35637 MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 performs cite expansion before completing channel and direct message authorization checks, allowing unauthenticated remote attackers to access or manipulate content prior to authorization validation. This timing vulnerability exposes information disclosure and potential content tampering risks due to premature processing of cite operations that bypass security boundaries.

Information Disclosure Openclaw
NVD GitHub
CVSS 4.0
6.9
EPSS
0.0%
CVE-2026-35636 HIGH PATCH This Week

Session isolation bypass in OpenClaw 2026.3.11 through 2026.3.24 allows authenticated attackers to access parent or sibling sessions bypassing visibility restrictions. The vulnerability exploits session_status logic that resolves sessionId to canonical session keys before enforcing explicit sessionKey-based access controls, enabling sandboxed child sessions to read data from sessions they should not access. No public exploit identified at time of analysis. Impacts confidentiality of session data across isolation boundaries in multi-tenant or sandboxed deployment scenarios.

Canonical Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
7.1
EPSS
0.0%
CVE-2026-35627 MEDIUM PATCH GHSA This Month

OpenClaw before 2026.3.22 processes cryptographic operations on inbound Nostr direct messages prior to validating sender identity and pairing status, allowing unauthenticated remote attackers to trigger denial of service through resource exhaustion by sending crafted messages. CVSS 6.9 reflects moderate impact with low integrity and availability degradation; no public exploit code or active exploitation has been confirmed.

Denial Of Service Openclaw
NVD GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2026-35386 LOW Monitor

OpenSSH before version 10.3 allows local privilege escalation through shell metacharacter injection in usernames when non-default ssh_config token expansion (%) is enabled. A local authenticated attacker with limited privileges can execute arbitrary commands by crafting a malicious username containing shell metacharacters, provided the system administrator has configured ssh_config to expand user-controlled tokens. This requires low user privileges and high attack complexity due to configuration constraints, but impacts confidentiality and integrity on affected systems.

Information Disclosure Ssh
NVD VulDB
CVSS 3.1
3.6
EPSS
0.0%
CVE-2026-33305 MEDIUM This Month

A remote code execution vulnerability in OpenEMR (CVSS 5.4) that allows any authenticated openemr user. Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-9904 MEDIUM This Month

CVE-2025-9904 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-55114 MEDIUM This Month

The improper order of AUTHORIZED_CTM_IP validation in the Control-M/Agent, where the Control-M/Server IP address is validated only after the SSL/TLS handshake is completed, exposes the. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Denial Of Service
NVD
CVSS 4.0
6.9
EPSS
0.0%
CVE-2026-35652
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 suffers from an authorization bypass in its interactive callback dispatch mechanism that permits unauthenticated remote attackers to execute action handlers without sender allowlist validation. The vulnerability exploits a race condition or timing gap where callbacks are processed before security checks complete, enabling unauthorized state modification and availability impact. No public exploit code or active exploitation has been confirmed at time of analysis, but the low attack complexity and lack of authentication requirements make this a practical threat to exposed OpenClaw deployments.

Authentication Bypass
NVD GitHub
CVE-2026-40223
EPSS 0% CVSS 4.7
MEDIUM This Month

Local denial of service in systemd 258 through 259 allows unprivileged users to trigger an assertion failure by interacting with service units configured with Delegate=yes and no explicit User setting, causing the systemd daemon to crash. The vulnerability requires local access and specific unit configuration but poses moderate risk to system availability with a CVSS score of 4.7 and no active exploitation currently identified.

Information Disclosure
NVD GitHub
CVE-2026-35640
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 processes JSON webhook request bodies before validating cryptographic signatures, allowing unauthenticated remote attackers to trigger denial of service by submitting malicious webhook payloads that force computationally expensive JSON parsing operations. The vulnerability exploits a logic-ordering defect where signature validation occurs after resource-intensive parsing, enabling attackers to exhaust server resources without valid credentials. No public exploit code has been identified at the time of analysis, though the attack requires only network access and is trivially exploitable.

Denial Of Service Openclaw
NVD GitHub
CVE-2026-35637
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 performs cite expansion before completing channel and direct message authorization checks, allowing unauthenticated remote attackers to access or manipulate content prior to authorization validation. This timing vulnerability exposes information disclosure and potential content tampering risks due to premature processing of cite operations that bypass security boundaries.

Information Disclosure Openclaw
NVD GitHub
CVE-2026-35636
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Session isolation bypass in OpenClaw 2026.3.11 through 2026.3.24 allows authenticated attackers to access parent or sibling sessions bypassing visibility restrictions. The vulnerability exploits session_status logic that resolves sessionId to canonical session keys before enforcing explicit sessionKey-based access controls, enabling sandboxed child sessions to read data from sessions they should not access. No public exploit identified at time of analysis. Impacts confidentiality of session data across isolation boundaries in multi-tenant or sandboxed deployment scenarios.

Canonical Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35627
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

OpenClaw before 2026.3.22 processes cryptographic operations on inbound Nostr direct messages prior to validating sender identity and pairing status, allowing unauthenticated remote attackers to trigger denial of service through resource exhaustion by sending crafted messages. CVSS 6.9 reflects moderate impact with low integrity and availability degradation; no public exploit code or active exploitation has been confirmed.

Denial Of Service Openclaw
NVD GitHub
CVE-2026-35386
EPSS 0% CVSS 3.6
LOW Monitor

OpenSSH before version 10.3 allows local privilege escalation through shell metacharacter injection in usernames when non-default ssh_config token expansion (%) is enabled. A local authenticated attacker with limited privileges can execute arbitrary commands by crafting a malicious username containing shell metacharacters, provided the system administrator has configured ssh_config to expand user-controlled tokens. This requires low user privileges and high attack complexity due to configuration constraints, but impacts confidentiality and integrity on affected systems.

Information Disclosure Ssh
NVD VulDB
CVE-2026-33305
EPSS 0% CVSS 5.4
MEDIUM This Month

A remote code execution vulnerability in OpenEMR (CVSS 5.4) that allows any authenticated openemr user. Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD GitHub VulDB
CVE-2025-9904
EPSS 0% CVSS 5.3
MEDIUM This Month

CVE-2025-9904 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD VulDB
CVE-2025-55114
EPSS 0% CVSS 6.9
MEDIUM This Month

The improper order of AUTHORIZED_CTM_IP validation in the Control-M/Agent, where the Control-M/Server IP address is validated only after the SSL/TLS handshake is completed, exposes the. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Denial Of Service
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy