Openclaw

126 CVEs product

Monthly

CVE-2026-6011 MEDIUM POC PATCH This Month

Server-side request forgery (SSRF) in OpenClaw's assertPublicHostname handler (src/agents/tools/web-fetch.ts) allows remote attackers to craft requests that bypass hostname validation and reach internal or restricted systems. Affected versions up to 2026.1.26 are vulnerable; the attack requires high complexity but publicly available exploit code exists. Vendor-released patch version 2026.1.29 (commit b623557a2ec7e271bda003eb3ac33fbb2e218505) resolves the issue.

Node.js SSRF Openclaw
NVD VulDB GitHub
CVSS 4.0
6.3
EPSS
0.0%
CVE-2026-35646 MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 allows unauthenticated remote attackers to bypass pre-authentication rate limiting on webhook token validation, enabling brute-force attacks against weak webhook secrets through rapid successive requests. The vulnerability stems from absent throttling on invalid token rejection attempts, permitting attackers to enumerate valid tokens without login credentials or triggering defensive rate-limiting mechanisms.

Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
6.3
EPSS
0.1%
CVE-2026-35645 MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSession function that improperly uses a synthetic operator.admin runtime scope, allowing authenticated attackers to execute privileged operations with unintended administrative access by triggering session deletion without a request-scoped client. CVSS score of 6.1 reflects the requirement for low-level user authentication (PR:L) and network accessibility; patch availability is confirmed.

Privilege Escalation Openclaw
NVD GitHub
CVSS 4.0
6.1
EPSS
0.0%
CVE-2026-35644 HIGH PATCH This Week

Credential exposure in OpenClaw gateway snapshots enables authenticated attackers with operator.read scope to extract embedded authentication tokens from channel configuration URLs. Attackers query config.get and channels.status API endpoints to retrieve gateway snapshots containing credentials in URL userinfo components of baseUrl and httpUrl fields. Affects OpenClaw versions prior to 2026.3.22. Authentication required (PR:L); no public exploit identified at time of analysis.

Information Disclosure Openclaw
NVD GitHub
CVSS 4.0
7.1
EPSS
0.0%
CVE-2026-35642 MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 allows authenticated attackers to bypass authorization controls in mention-gated groups by triggering reaction events that circumvent the requireMention access control mechanism, enabling them to enqueue agent-visible system events that should remain restricted. This medium-severity vulnerability (CVSS 5.3) affects the integrity of group-based access policies and requires user interaction at the network level but leverages low privilege requirements.

Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
5.3
EPSS
0.0%
CVE-2026-35640 MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 processes JSON webhook request bodies before validating cryptographic signatures, allowing unauthenticated remote attackers to trigger denial of service by submitting malicious webhook payloads that force computationally expensive JSON parsing operations. The vulnerability exploits a logic-ordering defect where signature validation occurs after resource-intensive parsing, enabling attackers to exhaust server resources without valid credentials. No public exploit code has been identified at the time of analysis, though the attack requires only network access and is trivially exploitable.

Denial Of Service Openclaw
NVD GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2026-35639 HIGH PATCH GHSA This Week

Privilege escalation in OpenClaw before 2026.3.22 enables authenticated attackers with operator.pairing approver role to escalate privileges to operator.admin through insufficient scope validation in the device.pair.approve method. Exploitation allows approval of device requests with broader operator scopes than the approver legitimately holds, ultimately enabling remote code execution on Node infrastructure. Affects OpenClaw deployments where role-based access control enforces operator privilege hierarchies. No public exploit identified at time of analysis.

RCE Privilege Escalation Openclaw
NVD GitHub
CVSS 4.0
8.7
EPSS
0.2%
CVE-2026-35638 HIGH PATCH This Week

Privilege escalation in OpenClaw Control UI enables unauthenticated attackers to claim arbitrary privileged scopes without device identity verification. By exploiting the trusted-proxy mechanism's device-less allow path, attackers bypass authentication requirements and maintain elevated permissions across sessions. Affects OpenClaw versions prior to 2026.3.22. Attackers with low-privilege access can escalate to high-impact confidentiality and integrity compromise. No public exploit identified at time of analysis.

Privilege Escalation Openclaw
NVD GitHub
CVSS 4.0
8.7
EPSS
0.0%
CVE-2026-35637 MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 performs cite expansion before completing channel and direct message authorization checks, allowing unauthenticated remote attackers to access or manipulate content prior to authorization validation. This timing vulnerability exposes information disclosure and potential content tampering risks due to premature processing of cite operations that bypass security boundaries.

Information Disclosure Openclaw
NVD GitHub
CVSS 4.0
6.9
EPSS
0.0%
CVE-2026-35636 HIGH PATCH This Week

Session isolation bypass in OpenClaw 2026.3.11 through 2026.3.24 allows authenticated attackers to access parent or sibling sessions bypassing visibility restrictions. The vulnerability exploits session_status logic that resolves sessionId to canonical session keys before enforcing explicit sessionKey-based access controls, enabling sandboxed child sessions to read data from sessions they should not access. No public exploit identified at time of analysis. Impacts confidentiality of session data across isolation boundaries in multi-tenant or sandboxed deployment scenarios.

Canonical Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
7.1
EPSS
0.0%
CVE-2026-35635 MEDIUM PATCH This Month

OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in its Synology Chat extension that allows unauthenticated remote attackers to bypass per-account direct message access controls by collapsing multi-account configurations onto shared webhook paths. Attackers can exploit inherited or duplicate webhook paths to replace route ownership across accounts, potentially gaining unauthorized access to account-specific resources. No public exploit code or active exploitation has been confirmed at the time of analysis.

Authentication Bypass Synology Openclaw
NVD GitHub
CVSS 4.0
6.3
EPSS
0.0%
CVE-2026-35634 MEDIUM PATCH This Month

OpenClaw before version 2026.3.23 contains an authentication bypass in the Canvas gateway where the authorizeCanvasRequest() function unconditionally allows local-direct requests without validating bearer tokens or Canvas capabilities, enabling unauthenticated attackers on the local system to send loopback HTTP and WebSocket requests to bypass authentication and access Canvas routes. The vulnerability requires local network access but no prior authentication, affecting all versions prior to the patched release.

Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
5.1
EPSS
0.0%
CVE-2026-35633 MEDIUM PATCH GHSA This Month

OpenClaw before version 2026.3.22 allows remote attackers to trigger denial of service through unbounded memory allocation in HTTP error handling for remote media endpoints. By sending specially crafted HTTP error responses with large bodies, unauthenticated attackers can exhaust application memory, causing availability degradation. The vulnerability requires only network access and no user interaction, making it a practical attack vector for service disruption.

Information Disclosure Openclaw
NVD GitHub
CVSS 4.0
6.9
EPSS
0.2%
CVE-2026-35631 HIGH PATCH This Week

Authorization bypass in OpenClaw versions prior to 2026.3.22 allows authenticated low-privilege users to execute administrative control-plane operations through internal ACP chat commands. The vulnerability stems from missing operator.admin scope enforcement on mutating commands, enabling unauthorized users to invoke privileged actions that modify system configuration or state. Exploitation requires authenticated access but no elevated privileges, permitting lateral privilege escalation to administrative functions. No public exploit identified at time of analysis.

Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
7.1
EPSS
0.0%
CVE-2026-35629 MEDIUM PATCH GHSA This Month

Server-side request forgery (SSRF) in OpenClaw before version 2026.3.25 allows authenticated attackers to bypass configured endpoint protections through unguarded fetch() calls in channel extensions, enabling rebinding of requests to internal resources and potential unauthorized access to restricted services. The vulnerability affects multiple channel extensions that fail to properly validate or restrict base URL usage, with a CVSS score of 5.3 reflecting moderate risk due to required authentication and limited initial impact scope.

SSRF Openclaw
NVD GitHub
CVSS 4.0
5.3
EPSS
0.0%
CVE-2026-35628 MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 lacks rate limiting on Telegram webhook authentication, enabling unauthenticated remote attackers to brute-force weak webhook secrets through repeated guesses without throttling. This vulnerability permits systematic credential enumeration, potentially allowing attackers to forge webhook messages and intercept or manipulate Telegram-based communications processed by affected OpenClaw deployments. No public exploit code or active exploitation has been confirmed at this time.

Information Disclosure Openclaw
NVD GitHub
CVSS 4.0
6.3
EPSS
0.0%
CVE-2026-35627 MEDIUM PATCH GHSA This Month

OpenClaw before 2026.3.22 processes cryptographic operations on inbound Nostr direct messages prior to validating sender identity and pairing status, allowing unauthenticated remote attackers to trigger denial of service through resource exhaustion by sending crafted messages. CVSS 6.9 reflects moderate impact with low integrity and availability degradation; no public exploit code or active exploitation has been confirmed.

Denial Of Service Openclaw
NVD GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2026-35626 MEDIUM PATCH This Month

Unauthenticated resource exhaustion in OpenClaw before 2026.3.22 allows remote attackers to cause denial of service by sending large or malicious webhook requests to the voice call handler, which buffers request bodies before validating provider signatures. The vulnerability requires only network access (AV:N, PR:N) and can be exploited with low complexity, making it a practical attack vector for disrupting service availability.

Denial Of Service Openclaw
NVD GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2026-35625 HIGH PATCH This Week

Privilege escalation in OpenClaw (versions prior to 2026.3.25) enables authenticated local attackers to silently elevate permissions from operator.read to operator.admin during shared-auth reconnection events, achieving remote code execution on affected nodes. The vulnerability exploits auto-approval of scope-upgrade requests in local reconnection flows, requiring low-privilege local access (PR:L) with no user interaction. No public exploit identified at time of analysis. Vendor-released patch available via commit 81ebc7e0344fd19c85778e883bad45e2da972229.

RCE Privilege Escalation Openclaw
NVD GitHub
CVSS 4.0
8.5
EPSS
0.0%
CVE-2026-35624 LOW PATCH Monitor

OpenClaw before version 2026.3.22 uses room names instead of stable tokens for Nextcloud Talk room authorization, allowing authenticated attackers to bypass allowlist policies by creating similarly named rooms and gaining unauthorized access to protected conversations. The vulnerability requires low privileges and high attack complexity but poses a direct confidentiality and integrity risk to room access controls. No public exploit code or active exploitation has been reported.

Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
2.3
EPSS
0.1%
CVE-2026-35623 MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 allows unauthenticated remote attackers to brute-force webhook authentication credentials due to missing rate limiting on password validation attempts. The vulnerability enables attackers to perform repeated authentication guesses against the webhook endpoint without throttling, potentially compromising webhook security and gaining unauthorized access to webhook functionality.

Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
6.3
EPSS
0.0%
CVE-2026-35622 MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 contains an improper authentication verification flaw in its Google Chat webhook handling that allows authenticated attackers with low privileges to bypass webhook authentication by supplying non-deployment add-on principals, enabling unauthorized actions through the Google Chat integration with a CVSS score of 6.0 and confirmed vendor patch availability.

Google Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
6.0
EPSS
0.0%
CVE-2026-35618 HIGH PATCH GHSA This Week

Authentication bypass in OpenClaw versions prior to 2026.3.23 enables attackers to forge Plivo V2 signature-verified requests without credentials. The vulnerability stems from replay key derivation using full URLs with query parameters rather than canonicalized base URLs, allowing unauthenticated remote attackers to manipulate query strings on signed requests and generate new valid verification keys. This permits bypassing webhook authentication controls and injecting malicious requests into Plivo-integrated telephony workflows. No public exploit or active exploitation confirmed at time of analysis.

Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
8.3
EPSS
0.0%
CVE-2026-35617 LOW PATCH Monitor

OpenClaw before version 2026.3.25 contains an authorization bypass vulnerability in Google Chat group policy enforcement where attackers with authenticated access can manipulate space display names to rebind group policies and gain unauthorized access to protected resources. The vulnerability requires authenticated access and high attack complexity but affects confidentiality and integrity of protected data. A vendor patch has been released.

Google Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
2.3
EPSS
0.0%
CVE-2026-34512 HIGH PATCH This Week

Authorization bypass in OpenClaw versions prior to 2026.3.25 enables authenticated users to terminate arbitrary subagent sessions through the /sessions/:sessionKey/kill HTTP endpoint. Exploiting CWE-863 improper authorization, low-privilege authenticated attackers execute admin-level killSubagentRunAdmin functions without ownership or operator scope validation, achieving high integrity and availability impact on targeted sessions. No public exploit identified at time of analysis.

Authentication Bypass Openclaw
NVD GitHub
CVSS 4.0
7.2
EPSS
0.0%
CVE-2026-40037 HIGH PATCH GHSA This Week

Cross-origin request body replay in OpenClaw's fetchWithSsrFGuard function before version 2026.3.31 enables attackers to exfiltrate sensitive request data and headers to unintended origins through redirect manipulation. The vulnerability requires user interaction and allows high confidentiality impact through unsafe request body transmission across origin boundaries. Affects unauthenticated contexts. No public exploit identified at time of analysis, with low observed exploitation activity (EPSS <1%).

Open Redirect Openclaw
NVD GitHub VulDB
CVSS 4.0
7.1
EPSS
0.0%
CVE-2026-31999 MEDIUM PATCH This Month

OpenClaw versions prior to 2026.3.1 contain a current working directory (cwd) injection vulnerability in Windows wrapper resolution for .cmd/.bat files that allows local attackers to manipulate command execution through directory control during shell fallback mechanisms. An authenticated local attacker with low privileges can exploit this vulnerability to achieve command execution integrity loss by controlling the working directory, potentially leading to unauthorized code execution or privilege escalation. While no active in-the-wild exploitation has been reported in KEV databases, the vulnerability is documented with a proof-of-concept available through the vendor's security advisory on GitHub.

Command Injection Microsoft Openclaw Windows
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-31997 MEDIUM PATCH This Month

OpenClaw versions prior to 2026.3.1 contain a post-approval executable rebind vulnerability in the system.run approval mechanism that fails to pin executable identity when argv[0] is not a full path. An attacker with local access and low privileges can modify PATH environment variables after an operator approves a command execution to redirect the approval to execute a different binary, achieving arbitrary command execution with the privileges of the OpenClaw process. The vulnerability has a moderate CVSS score of 6.0 reflecting local attack vector and high privilege requirements, but poses significant risk in environments where approval workflows are relied upon for security boundaries.

Information Disclosure Openclaw
NVD GitHub VulDB
CVSS 3.1
6.0
EPSS
0.0%
CVE-2026-31995 MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.19 allow local attackers with limited privileges to execute arbitrary commands through the Lobster extension's Windows shell fallback mechanism by injecting malicious arguments into workflow processes. The vulnerability exploits cmd.exe command interpretation when spawn operations fail and trigger shell execution, enabling command injection with potential impact on system integrity and availability. A patch is available for affected versions.

Command Injection Microsoft Openclaw Windows
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-31994 HIGH PATCH This Week

OpenClaw contains a local command injection vulnerability in Windows scheduled task script generation that allows authenticated local attackers to inject arbitrary commands through unsafe handling of cmd metacharacters and CR/LF sequences in gateway.cmd files. OpenClaw versions prior to 2026.2.19 are affected. Attackers with control over service script generation arguments can execute unintended code in the scheduled task context with high impact to integrity and availability.

Command Injection Microsoft Openclaw Windows
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.1%
CVE-2026-31993 MEDIUM PATCH This Month

OpenClaw versions before 2026.2.22 contain an allowlist parsing flaw in the macOS companion app that enables authenticated operators with elevated privileges to bypass command execution controls and run arbitrary commands on paired hosts. The vulnerability affects systems with operator.write access and macOS beta nodes, allowing attackers to craft malicious shell-chain payloads that circumvent validation checks. A security patch is available.

Apple Authentication Bypass Openclaw macOS
NVD GitHub VulDB
CVSS 3.1
4.8
EPSS
0.0%
CVE-2026-31992 HIGH PATCH This Week

OpenClaw contains an allowlist bypass vulnerability in system.run guardrails that enables authenticated operators to execute arbitrary commands by exploiting the env -S flag when /usr/bin/env is allowlisted. The vulnerability affects all OpenClaw versions prior to 2026.2.23, allowing attackers with low-level privileges to bypass policy controls and execute shell wrapper payloads at runtime. No KEV status or public POC has been reported, though vendor patches are available.

Authentication Bypass Openclaw
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.1%
CVE-2026-31990 MEDIUM PATCH This Month

OpenClaw versions prior to 2026.3.2 contain a symlink traversal vulnerability in the stageSandboxMedia function that fails to validate destination symlinks during media staging operations. This allows local attackers with low privileges to write files outside the intended sandbox workspace by placing malicious symlinks in the media/inbound directory, resulting in arbitrary file overwrite on the host system. A patch is available from the vendor, and the vulnerability was reported by VulnCheck with public references including a GitHub security advisory and commit fix.

Information Disclosure Openclaw
NVD GitHub VulDB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-31989 HIGH PATCH This Week

OpenClaw versions prior to 2026.3.1 contain a server-side request forgery (SSRF) vulnerability in the web_search citation redirect resolution component that permits requests to private network ranges. Authenticated attackers with low privileges can manipulate citation redirect targets to force the OpenClaw server to make requests to loopback addresses, private networks, or internal infrastructure, potentially accessing sensitive internal services or data. The vulnerability has a CVSS score of 7.4 with changed scope, indicating potential lateral movement beyond the vulnerable component.

SSRF Openclaw
NVD GitHub VulDB
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-29608 MEDIUM PATCH This Month

OpenClaw 2026.3.1 contains an approval integrity bypass vulnerability in the system.run node-host execution feature where attackers can rewrite command-line arguments (argv) to change the semantics of operator-approved commands. An authenticated local attacker with low privileges can place malicious scripts in the working directory to execute unintended code despite the operator approving different command text, resulting in high-impact confidentiality, integrity, and availability violations. A patch is available from the vendor, and no public exploit code has been widely reported, but the vulnerability represents a critical trust boundary violation in approval workflows.

Information Disclosure Openclaw
NVD GitHub VulDB
CVSS 3.1
6.7
EPSS
0.0%
CVE-2026-28461 HIGH PATCH This Week

OpenClaw contains an unbounded memory growth vulnerability in its Zalo webhook endpoint that allows unauthenticated remote attackers to exhaust system memory through query string manipulation. OpenClaw versions prior to 2026.3.1 are affected. Attackers can send repeated HTTP requests with varying query parameters to trigger in-memory key accumulation, leading to memory pressure, process instability, or complete denial of service through out-of-memory conditions.

Denial Of Service Openclaw
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27670 MEDIUM PATCH This Month

OpenClaw versions before 2026.3.2 are vulnerable to a race condition in ZIP extraction that permits local attackers with limited privileges to write arbitrary files outside the intended extraction directory. By manipulating symlinks between path validation and write operations, an attacker can achieve arbitrary file placement on the system. A patch is available to resolve this integrity issue.

Information Disclosure Openclaw
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-27566 HIGH PATCH This Week

OpenClaw contains an allowlist bypass vulnerability in its system.run exec analysis that fails to properly unwrap wrapper binaries like env and bash. Attackers with low-level privileges can chain wrapper binaries to smuggle malicious commands that appear to satisfy allowlist entries while actually executing non-allowlisted payloads. A patch is available from the vendor, and the vulnerability was disclosed through VulnCheck advisory; no public proof-of-concept code or active exploitation (KEV listing) has been reported at this time.

Command Injection Openclaw
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.1%
CVE-2026-22176 MEDIUM PATCH This Month

OpenClaw versions before 2026.2.19 allow local authenticated users to execute arbitrary commands by injecting shell metacharacters into environment variable values during Windows Scheduled Task script generation. The vulnerability stems from unquoted variable assignments in gateway.cmd that fail to sanitize special characters like &, |, ^, %, and !, enabling command injection when the task script runs. A patch is available to address this local privilege escalation risk.

Command Injection Microsoft Openclaw Windows
NVD GitHub VulDB
CVSS 3.1
6.1
EPSS
0.1%
CVE-2026-27545 MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.26 contain a Time-of-Check-Time-of-Use (TOCTOU) approval bypass vulnerability in the system.run execution function that allows local attackers with low privileges to execute arbitrary commands from unintended filesystem locations. An attacker can exploit a race condition by modifying parent symlinks in the current working directory after command approval but before execution, redirecting execution while maintaining the appearance of a safe working directory. A patch is available from the vendor, and this vulnerability has been documented by both VulnCheck and the OpenClaw security advisory (GHSA-f7ww-2725-qvw2).

Authentication Bypass Openclaw
NVD GitHub VulDB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-27523 MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.24 contain a sandbox bind validation bypass vulnerability that allows local attackers with low privileges to circumvent allowed-root and blocked-path security checks through symlinked parent directories combined with non-existent leaf paths. An attacker can craft bind source paths that appear to reside within permitted sandbox roots but resolve outside sandbox boundaries once missing path components are created, effectively weakening the sandbox's bind-source isolation enforcement. A patch is available from the vendor, and exploitation requires local access with standard user privileges, making this a practical threat in multi-tenant or shared-system environments.

Path Traversal Openclaw
NVD GitHub VulDB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-27522 MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability that allows authenticated attackers to read arbitrary files from the host system through the sendAttachment and setGroupIcon message actions when sandboxRoot configuration is unset. An attacker with valid credentials can exploit path traversal to hydrate media from absolute file paths, gaining unauthorized access to sensitive files accessible by the OpenClaw runtime user. A patch is available from the vendor, and this vulnerability has been tracked in the ENISA EUVD database (EUVD-2026-12732) with confirmed GitHub security advisory and commit-level patch information.

Path Traversal Openclaw
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-22178 MEDIUM PATCH This Month

OpenClaw versions before 2026.2.19 are vulnerable to regex injection and denial of service through unescaped Feishu mention metadata in the stripBotMention function. An unauthenticated network attacker can craft malicious mention metadata containing nested-quantifier patterns or regex metacharacters to trigger catastrophic backtracking, block message processing, or remove unintended content before model processing, with a CVSS score of 6.5 indicating medium severity with integrity and availability impact. Patch availability exists from the vendor via GitHub commits, and proof-of-concept details are available through VulnCheck advisory references.

Denial Of Service Openclaw
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-22175 HIGH PATCH This Week

OpenClaw contains an execution approval bypass vulnerability in allowlist mode that allows authenticated attackers to circumvent allow-always grants through unrecognized multiplexer shell wrappers like busybox and toybox. Attackers with low-level privileges can invoke arbitrary payloads under these multiplexer wrappers to satisfy stored allowlist rules while executing unintended commands. This affects all OpenClaw versions prior to 2026.2.23, with a patch now available from the vendor.

Authentication Bypass Openclaw
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.1%
CVE-2026-22171 HIGH PATCH This Week

OpenClaw contains a path traversal vulnerability in the Feishu media download functionality where untrusted media key values are directly interpolated into temporary file paths without sanitization. OpenClaw versions prior to 2026.2.19 are affected, allowing remote unauthenticated attackers to write arbitrary files within the process permissions by using directory traversal sequences in media keys. No public evidence of active exploitation (KEV) or public proof-of-concept exists at this time, though the high CVSS score of 8.2 reflects the network-accessible attack vector and lack of authentication requirements.

Path Traversal Openclaw
NVD GitHub VulDB
CVSS 3.1
8.2
EPSS
0.0%
CVE-2026-22168 MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.21 contain an approval-integrity mismatch vulnerability in the system.run function that allows authenticated operators to execute arbitrary commands on Windows systems by appending malicious arguments after cmd.exe /c while the approval audit log records only the benign command text. An authenticated attacker with operator privileges can exploit this to achieve local command execution on trusted Windows nodes with mismatched or incomplete audit trails, enabling information disclosure and lateral movement while evading detection.

Information Disclosure Microsoft Openclaw Windows
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-4039 MEDIUM PATCH This Month

Code injection in OpenClaw 2026.2.19 and earlier through the Skill Env Handler's applySkillConfigenvOverrides function allows authenticated remote attackers to execute arbitrary code with low integrity and confidentiality impact. An authenticated user can manipulate environment configuration settings to inject malicious code that executes in the context of the application. Mitigation requires upgrading to version 2026.2.21-beta.1 or later, as no official patch is currently available for production releases.

Code Injection Openclaw
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-30741 CRITICAL Act Now

RCE in OpenClaw Agent Platform v2026.2.6 via prompt injection.

RCE Code Injection Openclaw
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-32063 HIGH PATCH This Week

OpenClaw versions prior to 2026.2.21 allow local attackers with limited privileges to inject arbitrary systemd directives through unvalidated environment variables in unit file generation, enabling command execution with gateway service privileges. By manipulating config.env.vars and triggering service installation or restart, an attacker can bypass Environment= line constraints via newline injection to achieve arbitrary code execution. No patch is currently available for this command injection vulnerability.

Command Injection Openclaw
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.1%
CVE-2026-32061 MEDIUM PATCH This Month

OpenClaw versions before 2026.2.17 allow privileged users with config modification access to read arbitrary files on the system through path traversal in the $include directive. An attacker in this position can exploit absolute paths, directory traversal sequences, or symlinks to access sensitive data like API keys and credentials that the OpenClaw process can read. No patch is currently available for this medium-severity vulnerability.

Path Traversal Openclaw
NVD GitHub VulDB
CVSS 3.1
4.4
EPSS
0.0%
CVE-2026-32060 HIGH PATCH This Week

OpenClaw versions before 2026.2.14 allow authenticated attackers to bypass filesystem restrictions in the apply_patch function through path traversal, enabling arbitrary file write and deletion operations outside the intended workspace. The vulnerability requires an authenticated user but no additional user interaction, and affects systems with apply_patch enabled without sandbox containment. No patch is currently available.

Path Traversal Openclaw
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.3%
CVE-2026-32059 HIGH PATCH This Week

OpenClaw version 2026.2.22-2 versions up to 2026.2.23 is affected by incorrect authorization (CVSS 8.8).

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-29613 MEDIUM PATCH This Month

Openclaw versions up to 2026.2.12 is affected by missing authentication for critical function (CVSS 5.9).

React Openclaw
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-29612 MEDIUM PATCH This Month

Openclaw versions up to 2026.2.14 is affected by allocation of resources without limits or throttling (CVSS 5.5).

Denial Of Service Openclaw
NVD GitHub
CVSS 3.1
5.5
EPSS
0.1%
CVE-2026-29611 HIGH PATCH This Week

Openclaw versions up to 2026.2.14 contains a vulnerability that allows attackers to read arbitrary files from the local filesystem (CVSS 7.5).

Lfi Openclaw
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-29610 HIGH PATCH This Week

Arbitrary command execution in OpenClaw prior to version 2026.2.14 stems from improper PATH validation during node-host execution and project bootstrapping, allowing authenticated attackers or those with local filesystem access to substitute malicious binaries for legitimate commands. An attacker can exploit this to bypass allowlisted command restrictions and achieve code execution with the privileges of the OpenClaw process. A patch is available for versions 2026.2.14 and later.

Privilege Escalation Openclaw
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-29609 HIGH PATCH This Week

Openclaw versions up to 2026.2.14 is affected by allocation of resources without limits or throttling (CVSS 7.5).

Denial Of Service Openclaw
NVD GitHub
CVSS 3.1
7.5
EPSS
0.2%
CVE-2026-29606 MEDIUM PATCH This Month

Openclaw versions up to 2026.2.14 is affected by missing authentication for critical function (CVSS 6.5).

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-28486 MEDIUM PATCH This Month

OpenClaw versions 2026.1.16 through 2026.2.13 allow local attackers to write arbitrary files outside intended directories by supplying malicious archives to the skills, hooks, plugins, or signal installation commands. Successful exploitation enables attackers to achieve code execution or establish persistence on affected systems. A patch is available for affected users.

Path Traversal Openclaw
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-28485 HIGH PATCH This Week

Openclaw versions up to 2026.2.12 is affected by missing authentication for critical function (CVSS 8.4).

Authentication Bypass RCE Openclaw
NVD GitHub
CVSS 3.1
8.4
EPSS
0.1%
CVE-2026-28481 MEDIUM PATCH This Month

OpenClaw versions 2026.1.30 and earlier leak authentication bearer tokens to untrusted domains when the optional MS Teams attachment downloader extension is enabled, due to overly permissive suffix-based domain allowlisting during download retries. An attacker could harvest these tokens from allowed domains to compromise authenticated sessions. No patch is currently available, affecting users of the vulnerable versions.

Information Disclosure Openclaw
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-28480 MEDIUM PATCH This Month

OpenClaw prior to version 2026.2.14 fails to properly validate Telegram allowlist entries by accepting mutable usernames instead of immutable user IDs, enabling attackers to register recycled usernames and bypass access controls. An unauthenticated attacker can exploit this flaw to impersonate legitimate users and send unauthorized commands to OpenClaw bots. No patch is currently available.

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-28479 HIGH PATCH This Week

OpenClaw versions up to 2026.2.15 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Docker Information Disclosure Openclaw
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-28478 HIGH PATCH This Week

OpenClaw versions up to 2026.2.13 is affected by allocation of resources without limits or throttling (CVSS 7.5).

Denial Of Service Openclaw
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-28477 HIGH PATCH This Week

OpenClaw versions before 2026.2.14 fail to properly validate OAuth state parameters in the Chutes login flow, allowing attackers to bypass CSRF protections and hijack user sessions. An attacker can trick a user into pasting malicious OAuth callback data to gain unauthorized access and maintain persistent tokens under a compromised account. No patch is currently available for this high-severity vulnerability.

CSRF Openclaw
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-28475 MEDIUM PATCH This Month

OpenClaw versions before 2026.2.13 are vulnerable to timing side-channel attacks on hook token validation due to use of non-constant-time string comparison. Remote attackers can exploit this weakness by measuring response times across multiple requests to gradually recover authentication tokens for the hooks endpoint. This affects confidentiality and integrity of OpenClaw deployments accessible over the network.

Information Disclosure Openclaw
NVD GitHub
CVSS 3.1
4.8
EPSS
0.1%
CVE-2026-28473 HIGH PATCH This Week

OpenClaw prior to version 2026.2.2 allows authenticated users with operator.write scope to bypass approval controls and resolve execution requests through a chat command that circumvents authorization checks. An attacker with this scope can approve or deny exec approval requests without having the required operator.approvals permission, effectively gaining unauthorized approval authority. A patch is available for affected installations.

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-28472 HIGH PATCH This Week

Openclaw versions up to 2026.2.2 is affected by missing authentication for critical function (CVSS 8.1).

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-28471 MEDIUM PATCH This Month

OpenClaw versions 2026.1.14-1 through 2026.2.1 with the Matrix plugin enabled fail to validate homeserver identity when checking direct message allowlists, allowing remote attackers to impersonate authorized users by spoofing display names or local identifiers from different homeservers. This bypass enables unauthorized access to routing and agent pipelines for authenticated Matrix users on remote servers. A patch is available in version 2026.2.2 and later.

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-28469 HIGH PATCH This Week

Openclaw versions up to 2026.2.14 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Industrial Openclaw
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-28468 HIGH PATCH This Week

Openclaw versions up to 2026.2.14 is affected by missing authentication for critical function (CVSS 7.7).

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-28467 MEDIUM POC PATCH This Month

OpenClaw prior to version 2026.2.2 is vulnerable to server-side request forgery through its attachment and media URL processing, allowing unauthenticated remote attackers to make arbitrary HTTP requests to internal resources. Attackers can exploit model-controlled message features to trigger the SSRF and exfiltrate response data as outbound attachments. Public exploit code exists for this vulnerability.

SSRF AI / ML Openclaw
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-28466 CRITICAL PATCH Act Now

Gateway authorization bypass in OpenClaw before 2026.2.14. Unsanitized approval fields in node.invoke. Patch available.

Authentication Bypass RCE Openclaw
NVD GitHub
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-28465 MEDIUM PATCH This Month

OpenClaw voice-call plugin versions before 2026.2.3 allow remote attackers to forge webhook events by exploiting improper authentication in reverse-proxy environments where forwarded headers are implicitly trusted. An unauthenticated attacker can manipulate Forwarded or X-Forwarded-* headers to bypass webhook verification and spoof legitimate events. A patch is available to address this authentication bypass vulnerability.

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
5.9
EPSS
0.1%
CVE-2026-28464 MEDIUM PATCH This Month

OpenClaw versions before 2026.2.12 are vulnerable to timing-based token extraction attacks due to non-constant-time string comparison in hook authentication. A network-based attacker can exploit this side-channel vulnerability to gradually recover the hook validation token through repeated timing measurements across multiple requests. The vulnerability requires repeated probing but poses a confidentiality risk to systems using vulnerable versions.

Information Disclosure Openclaw
NVD GitHub
CVSS 3.1
5.9
EPSS
0.1%
CVE-2026-28462 HIGH PATCH This Week

OpenClaw versions before 2026.2.13 suffer from a path traversal vulnerability in the browser control API that allows authenticated attackers to write arbitrary files outside designated temporary directories via the trace and download endpoints. An attacker with API access can exploit this to place malicious files in unintended locations on the system. A patch is available to address this high-severity flaw.

Path Traversal Openclaw
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-28459 HIGH PATCH This Week

Arbitrary file write in OpenClaw prior to version 2026.2.12 allows authenticated gateway clients to bypass path validation on the sessionFile parameter and write transcript data to any location on the host filesystem. An attacker with valid credentials can repeatedly append data to arbitrary files, potentially corrupting configurations or exhausting disk space to cause denial of service. A patch is available.

Denial Of Service Openclaw
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-28458 HIGH PATCH This Week

Openclaw versions up to 2026.2.1 is affected by missing authentication for critical function (CVSS 8.1).

Authentication Bypass Information Disclosure Openclaw
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-28457 MEDIUM PATCH This Month

OpenClaw versions before 2026.2.14 allow local attackers to write arbitrary files outside the sandbox directory through path traversal sequences in crafted skill package names when sandbox skill mirroring is enabled. An attacker can exploit this by providing a malicious skill package with traversal patterns like ../ or absolute paths in the frontmatter name parameter, potentially compromising system integrity. A patch is available to remediate this vulnerability.

Path Traversal Openclaw
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-28456 HIGH PATCH This Week

Improper path validation in OpenClaw Gateway versions before 2026.2.14 enables authenticated administrators to achieve arbitrary code execution by manipulating hook module paths passed to dynamic imports. An attacker with configuration modification privileges can load and execute malicious local modules within the Node.js process, gaining full system compromise capabilities.

Node.js Openclaw
NVD GitHub
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-28454 HIGH PATCH This Week

Openclaw versions up to 2026.2.2 is affected by insufficient verification of data authenticity (CVSS 7.5).

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-28453 HIGH PATCH This Week

OpenClaw before version 2026.2.14 fails to properly validate file paths when extracting TAR archives, enabling attackers to use path traversal sequences to write files outside the intended extraction directory. An unauthenticated remote attacker can exploit this to overwrite configuration files or inject malicious code into the system. A patch is available for affected versions.

Path Traversal Openclaw
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-28452 MEDIUM PATCH This Month

Openclaw versions up to 2026.2.14 is affected by allocation of resources without limits or throttling (CVSS 5.5).

Denial Of Service Openclaw
NVD GitHub
CVSS 3.1
5.5
EPSS
0.2%
CVE-2026-28451 HIGH PATCH This Week

OpenClaw versions before 2026.2.14 contain unprotected server-side request forgery flaws in the Feishu extension that enable remote attackers to access internal services and exfiltrate data without authentication. Attackers can exploit the sendMediaFeishu function and markdown image processing through direct manipulation or prompt injection to force the application to fetch attacker-controlled URLs and re-upload responses as Feishu media. A patch is available to remediate this network-accessible vulnerability affecting AI/ML deployments.

SSRF AI / ML Openclaw
NVD GitHub
CVSS 3.1
8.3
EPSS
0.0%
CVE-2026-28450 MEDIUM PATCH This Month

OpenClaw versions before 2026.2.12 with the Nostr plugin enabled contain unauthenticated API endpoints that allow remote attackers to read and modify Nostr profiles without authentication when the gateway HTTP port is network-accessible. Attackers can exploit this to steal sensitive profile data, alter gateway configuration, and sign malicious Nostr events using the bot's private key. A patch is available for affected installations.

Authentication Bypass Information Disclosure Openclaw
NVD GitHub
CVSS 3.1
6.8
EPSS
0.1%
CVE-2026-28448 HIGH POC PATCH This Week

OpenClaw versions before 2026.2.1 fail to properly validate access controls in the Twitch plugin when role restrictions are not configured, allowing unauthenticated remote attackers to trigger agent dispatch through Twitch chat mentions. Public exploit code exists for this vulnerability, enabling attackers to invoke the agent pipeline and potentially cause unintended actions or resource exhaustion. Organizations running affected versions with the Twitch plugin enabled should apply the available patch immediately.

Denial Of Service Authentication Bypass AI / ML Openclaw
NVD GitHub
CVSS 3.1
7.3
EPSS
0.1%
CVE-2026-28447 HIGH PATCH This Week

OpenClaw 2026.1.29-beta.1 through 2026.2.0 is vulnerable to path traversal during plugin installation, enabling attackers to write arbitrary files outside the intended extensions directory by crafting malicious package names with traversal sequences. An unauthenticated attacker can exploit this when users execute the plugin install command, potentially achieving arbitrary file write capabilities on the affected system. A patch is available in version 2026.2.1.

Path Traversal Openclaw
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-28446 CRITICAL POC PATCH Act Now

Auth bypass in OpenClaw voice-call extension before 2026.2.1. EPSS 0.68%. PoC and patch available.

Authentication Bypass AI / ML Openclaw
NVD GitHub
CVSS 3.1
9.4
EPSS
0.7%
CVE-2026-28395 MEDIUM PATCH This Month

OpenClaw Chrome extension relay server versions prior to 2026.2.12 improperly bind to all network interfaces when wildcard cdpUrl values are configured, enabling remote attackers to discover service endpoints and port information. An attacker can exploit this exposure to conduct denial-of-service attacks and brute-force attempts against the relay token authentication mechanism without requiring local access.

Dns Openclaw Chrome
NVD GitHub
CVSS 3.1
6.5
EPSS
0.2%
CVE-2026-28394 MEDIUM PATCH This Month

Openclaw versions up to 2026.2.15 is affected by allocation of resources without limits or throttling (CVSS 6.5).

Denial Of Service Openclaw
NVD GitHub
CVSS 3.1
6.5
EPSS
0.2%
CVE-2026-6011
EPSS 0% CVSS 6.3
MEDIUM POC PATCH This Month

Server-side request forgery (SSRF) in OpenClaw's assertPublicHostname handler (src/agents/tools/web-fetch.ts) allows remote attackers to craft requests that bypass hostname validation and reach internal or restricted systems. Affected versions up to 2026.1.26 are vulnerable; the attack requires high complexity but publicly available exploit code exists. Vendor-released patch version 2026.1.29 (commit b623557a2ec7e271bda003eb3ac33fbb2e218505) resolves the issue.

Node.js SSRF Openclaw
NVD VulDB GitHub
CVE-2026-35646
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 allows unauthenticated remote attackers to bypass pre-authentication rate limiting on webhook token validation, enabling brute-force attacks against weak webhook secrets through rapid successive requests. The vulnerability stems from absent throttling on invalid token rejection attempts, permitting attackers to enumerate valid tokens without login credentials or triggering defensive rate-limiting mechanisms.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35645
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSession function that improperly uses a synthetic operator.admin runtime scope, allowing authenticated attackers to execute privileged operations with unintended administrative access by triggering session deletion without a request-scoped client. CVSS score of 6.1 reflects the requirement for low-level user authentication (PR:L) and network accessibility; patch availability is confirmed.

Privilege Escalation Openclaw
NVD GitHub
CVE-2026-35644
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Credential exposure in OpenClaw gateway snapshots enables authenticated attackers with operator.read scope to extract embedded authentication tokens from channel configuration URLs. Attackers query config.get and channels.status API endpoints to retrieve gateway snapshots containing credentials in URL userinfo components of baseUrl and httpUrl fields. Affects OpenClaw versions prior to 2026.3.22. Authentication required (PR:L); no public exploit identified at time of analysis.

Information Disclosure Openclaw
NVD GitHub
CVE-2026-35642
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 allows authenticated attackers to bypass authorization controls in mention-gated groups by triggering reaction events that circumvent the requireMention access control mechanism, enabling them to enqueue agent-visible system events that should remain restricted. This medium-severity vulnerability (CVSS 5.3) affects the integrity of group-based access policies and requires user interaction at the network level but leverages low privilege requirements.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35640
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 processes JSON webhook request bodies before validating cryptographic signatures, allowing unauthenticated remote attackers to trigger denial of service by submitting malicious webhook payloads that force computationally expensive JSON parsing operations. The vulnerability exploits a logic-ordering defect where signature validation occurs after resource-intensive parsing, enabling attackers to exhaust server resources without valid credentials. No public exploit code has been identified at the time of analysis, though the attack requires only network access and is trivially exploitable.

Denial Of Service Openclaw
NVD GitHub
CVE-2026-35639
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Privilege escalation in OpenClaw before 2026.3.22 enables authenticated attackers with operator.pairing approver role to escalate privileges to operator.admin through insufficient scope validation in the device.pair.approve method. Exploitation allows approval of device requests with broader operator scopes than the approver legitimately holds, ultimately enabling remote code execution on Node infrastructure. Affects OpenClaw deployments where role-based access control enforces operator privilege hierarchies. No public exploit identified at time of analysis.

RCE Privilege Escalation Openclaw
NVD GitHub
CVE-2026-35638
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Privilege escalation in OpenClaw Control UI enables unauthenticated attackers to claim arbitrary privileged scopes without device identity verification. By exploiting the trusted-proxy mechanism's device-less allow path, attackers bypass authentication requirements and maintain elevated permissions across sessions. Affects OpenClaw versions prior to 2026.3.22. Attackers with low-privilege access can escalate to high-impact confidentiality and integrity compromise. No public exploit identified at time of analysis.

Privilege Escalation Openclaw
NVD GitHub
CVE-2026-35637
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 performs cite expansion before completing channel and direct message authorization checks, allowing unauthenticated remote attackers to access or manipulate content prior to authorization validation. This timing vulnerability exposes information disclosure and potential content tampering risks due to premature processing of cite operations that bypass security boundaries.

Information Disclosure Openclaw
NVD GitHub
CVE-2026-35636
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Session isolation bypass in OpenClaw 2026.3.11 through 2026.3.24 allows authenticated attackers to access parent or sibling sessions bypassing visibility restrictions. The vulnerability exploits session_status logic that resolves sessionId to canonical session keys before enforcing explicit sessionKey-based access controls, enabling sandboxed child sessions to read data from sessions they should not access. No public exploit identified at time of analysis. Impacts confidentiality of session data across isolation boundaries in multi-tenant or sandboxed deployment scenarios.

Canonical Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35635
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in its Synology Chat extension that allows unauthenticated remote attackers to bypass per-account direct message access controls by collapsing multi-account configurations onto shared webhook paths. Attackers can exploit inherited or duplicate webhook paths to replace route ownership across accounts, potentially gaining unauthorized access to account-specific resources. No public exploit code or active exploitation has been confirmed at the time of analysis.

Authentication Bypass Synology Openclaw
NVD GitHub
CVE-2026-35634
EPSS 0% CVSS 5.1
MEDIUM PATCH This Month

OpenClaw before version 2026.3.23 contains an authentication bypass in the Canvas gateway where the authorizeCanvasRequest() function unconditionally allows local-direct requests without validating bearer tokens or Canvas capabilities, enabling unauthenticated attackers on the local system to send loopback HTTP and WebSocket requests to bypass authentication and access Canvas routes. The vulnerability requires local network access but no prior authentication, affecting all versions prior to the patched release.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35633
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 allows remote attackers to trigger denial of service through unbounded memory allocation in HTTP error handling for remote media endpoints. By sending specially crafted HTTP error responses with large bodies, unauthenticated attackers can exhaust application memory, causing availability degradation. The vulnerability requires only network access and no user interaction, making it a practical attack vector for service disruption.

Information Disclosure Openclaw
NVD GitHub
CVE-2026-35631
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Authorization bypass in OpenClaw versions prior to 2026.3.22 allows authenticated low-privilege users to execute administrative control-plane operations through internal ACP chat commands. The vulnerability stems from missing operator.admin scope enforcement on mutating commands, enabling unauthorized users to invoke privileged actions that modify system configuration or state. Exploitation requires authenticated access but no elevated privileges, permitting lateral privilege escalation to administrative functions. No public exploit identified at time of analysis.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35629
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Server-side request forgery (SSRF) in OpenClaw before version 2026.3.25 allows authenticated attackers to bypass configured endpoint protections through unguarded fetch() calls in channel extensions, enabling rebinding of requests to internal resources and potential unauthorized access to restricted services. The vulnerability affects multiple channel extensions that fail to properly validate or restrict base URL usage, with a CVSS score of 5.3 reflecting moderate risk due to required authentication and limited initial impact scope.

SSRF Openclaw
NVD GitHub
CVE-2026-35628
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 lacks rate limiting on Telegram webhook authentication, enabling unauthenticated remote attackers to brute-force weak webhook secrets through repeated guesses without throttling. This vulnerability permits systematic credential enumeration, potentially allowing attackers to forge webhook messages and intercept or manipulate Telegram-based communications processed by affected OpenClaw deployments. No public exploit code or active exploitation has been confirmed at this time.

Information Disclosure Openclaw
NVD GitHub
CVE-2026-35627
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

OpenClaw before 2026.3.22 processes cryptographic operations on inbound Nostr direct messages prior to validating sender identity and pairing status, allowing unauthenticated remote attackers to trigger denial of service through resource exhaustion by sending crafted messages. CVSS 6.9 reflects moderate impact with low integrity and availability degradation; no public exploit code or active exploitation has been confirmed.

Denial Of Service Openclaw
NVD GitHub
CVE-2026-35626
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

Unauthenticated resource exhaustion in OpenClaw before 2026.3.22 allows remote attackers to cause denial of service by sending large or malicious webhook requests to the voice call handler, which buffers request bodies before validating provider signatures. The vulnerability requires only network access (AV:N, PR:N) and can be exploited with low complexity, making it a practical attack vector for disrupting service availability.

Denial Of Service Openclaw
NVD GitHub
CVE-2026-35625
EPSS 0% CVSS 8.5
HIGH PATCH This Week

Privilege escalation in OpenClaw (versions prior to 2026.3.25) enables authenticated local attackers to silently elevate permissions from operator.read to operator.admin during shared-auth reconnection events, achieving remote code execution on affected nodes. The vulnerability exploits auto-approval of scope-upgrade requests in local reconnection flows, requiring low-privilege local access (PR:L) with no user interaction. No public exploit identified at time of analysis. Vendor-released patch available via commit 81ebc7e0344fd19c85778e883bad45e2da972229.

RCE Privilege Escalation Openclaw
NVD GitHub
CVE-2026-35624
EPSS 0% CVSS 2.3
LOW PATCH Monitor

OpenClaw before version 2026.3.22 uses room names instead of stable tokens for Nextcloud Talk room authorization, allowing authenticated attackers to bypass allowlist policies by creating similarly named rooms and gaining unauthorized access to protected conversations. The vulnerability requires low privileges and high attack complexity but poses a direct confidentiality and integrity risk to room access controls. No public exploit code or active exploitation has been reported.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35623
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 allows unauthenticated remote attackers to brute-force webhook authentication credentials due to missing rate limiting on password validation attempts. The vulnerability enables attackers to perform repeated authentication guesses against the webhook endpoint without throttling, potentially compromising webhook security and gaining unauthorized access to webhook functionality.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35622
EPSS 0% CVSS 6.0
MEDIUM PATCH This Month

OpenClaw before version 2026.3.22 contains an improper authentication verification flaw in its Google Chat webhook handling that allows authenticated attackers with low privileges to bypass webhook authentication by supplying non-deployment add-on principals, enabling unauthorized actions through the Google Chat integration with a CVSS score of 6.0 and confirmed vendor patch availability.

Google Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35618
EPSS 0% CVSS 8.3
HIGH PATCH This Week

Authentication bypass in OpenClaw versions prior to 2026.3.23 enables attackers to forge Plivo V2 signature-verified requests without credentials. The vulnerability stems from replay key derivation using full URLs with query parameters rather than canonicalized base URLs, allowing unauthenticated remote attackers to manipulate query strings on signed requests and generate new valid verification keys. This permits bypassing webhook authentication controls and injecting malicious requests into Plivo-integrated telephony workflows. No public exploit or active exploitation confirmed at time of analysis.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-35617
EPSS 0% CVSS 2.3
LOW PATCH Monitor

OpenClaw before version 2026.3.25 contains an authorization bypass vulnerability in Google Chat group policy enforcement where attackers with authenticated access can manipulate space display names to rebind group policies and gain unauthorized access to protected resources. The vulnerability requires authenticated access and high attack complexity but affects confidentiality and integrity of protected data. A vendor patch has been released.

Google Authentication Bypass Openclaw
NVD GitHub
CVE-2026-34512
EPSS 0% CVSS 7.2
HIGH PATCH This Week

Authorization bypass in OpenClaw versions prior to 2026.3.25 enables authenticated users to terminate arbitrary subagent sessions through the /sessions/:sessionKey/kill HTTP endpoint. Exploiting CWE-863 improper authorization, low-privilege authenticated attackers execute admin-level killSubagentRunAdmin functions without ownership or operator scope validation, achieving high integrity and availability impact on targeted sessions. No public exploit identified at time of analysis.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-40037
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Cross-origin request body replay in OpenClaw's fetchWithSsrFGuard function before version 2026.3.31 enables attackers to exfiltrate sensitive request data and headers to unintended origins through redirect manipulation. The vulnerability requires user interaction and allows high confidentiality impact through unsafe request body transmission across origin boundaries. Affects unauthenticated contexts. No public exploit identified at time of analysis, with low observed exploitation activity (EPSS <1%).

Open Redirect Openclaw
NVD GitHub VulDB
CVE-2026-31999
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

OpenClaw versions prior to 2026.3.1 contain a current working directory (cwd) injection vulnerability in Windows wrapper resolution for .cmd/.bat files that allows local attackers to manipulate command execution through directory control during shell fallback mechanisms. An authenticated local attacker with low privileges can exploit this vulnerability to achieve command execution integrity loss by controlling the working directory, potentially leading to unauthorized code execution or privilege escalation. While no active in-the-wild exploitation has been reported in KEV databases, the vulnerability is documented with a proof-of-concept available through the vendor's security advisory on GitHub.

Command Injection Microsoft Openclaw +1
NVD GitHub VulDB
CVE-2026-31997
EPSS 0% CVSS 6.0
MEDIUM PATCH This Month

OpenClaw versions prior to 2026.3.1 contain a post-approval executable rebind vulnerability in the system.run approval mechanism that fails to pin executable identity when argv[0] is not a full path. An attacker with local access and low privileges can modify PATH environment variables after an operator approves a command execution to redirect the approval to execute a different binary, achieving arbitrary command execution with the privileges of the OpenClaw process. The vulnerability has a moderate CVSS score of 6.0 reflecting local attack vector and high privilege requirements, but poses significant risk in environments where approval workflows are relied upon for security boundaries.

Information Disclosure Openclaw
NVD GitHub VulDB
CVE-2026-31995
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.19 allow local attackers with limited privileges to execute arbitrary commands through the Lobster extension's Windows shell fallback mechanism by injecting malicious arguments into workflow processes. The vulnerability exploits cmd.exe command interpretation when spawn operations fail and trigger shell execution, enabling command injection with potential impact on system integrity and availability. A patch is available for affected versions.

Command Injection Microsoft Openclaw +1
NVD GitHub VulDB
CVE-2026-31994
EPSS 0% CVSS 7.1
HIGH PATCH This Week

OpenClaw contains a local command injection vulnerability in Windows scheduled task script generation that allows authenticated local attackers to inject arbitrary commands through unsafe handling of cmd metacharacters and CR/LF sequences in gateway.cmd files. OpenClaw versions prior to 2026.2.19 are affected. Attackers with control over service script generation arguments can execute unintended code in the scheduled task context with high impact to integrity and availability.

Command Injection Microsoft Openclaw +1
NVD GitHub VulDB
CVE-2026-31993
EPSS 0% CVSS 4.8
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.22 contain an allowlist parsing flaw in the macOS companion app that enables authenticated operators with elevated privileges to bypass command execution controls and run arbitrary commands on paired hosts. The vulnerability affects systems with operator.write access and macOS beta nodes, allowing attackers to craft malicious shell-chain payloads that circumvent validation checks. A security patch is available.

Apple Authentication Bypass Openclaw +1
NVD GitHub VulDB
CVE-2026-31992
EPSS 0% CVSS 7.1
HIGH PATCH This Week

OpenClaw contains an allowlist bypass vulnerability in system.run guardrails that enables authenticated operators to execute arbitrary commands by exploiting the env -S flag when /usr/bin/env is allowlisted. The vulnerability affects all OpenClaw versions prior to 2026.2.23, allowing attackers with low-level privileges to bypass policy controls and execute shell wrapper payloads at runtime. No KEV status or public POC has been reported, though vendor patches are available.

Authentication Bypass Openclaw
NVD GitHub VulDB
CVE-2026-31990
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw versions prior to 2026.3.2 contain a symlink traversal vulnerability in the stageSandboxMedia function that fails to validate destination symlinks during media staging operations. This allows local attackers with low privileges to write files outside the intended sandbox workspace by placing malicious symlinks in the media/inbound directory, resulting in arbitrary file overwrite on the host system. A patch is available from the vendor, and the vulnerability was reported by VulnCheck with public references including a GitHub security advisory and commit fix.

Information Disclosure Openclaw
NVD GitHub VulDB
CVE-2026-31989
EPSS 0% CVSS 7.4
HIGH PATCH This Week

OpenClaw versions prior to 2026.3.1 contain a server-side request forgery (SSRF) vulnerability in the web_search citation redirect resolution component that permits requests to private network ranges. Authenticated attackers with low privileges can manipulate citation redirect targets to force the OpenClaw server to make requests to loopback addresses, private networks, or internal infrastructure, potentially accessing sensitive internal services or data. The vulnerability has a CVSS score of 7.4 with changed scope, indicating potential lateral movement beyond the vulnerable component.

SSRF Openclaw
NVD GitHub VulDB
CVE-2026-29608
EPSS 0% CVSS 6.7
MEDIUM PATCH This Month

OpenClaw 2026.3.1 contains an approval integrity bypass vulnerability in the system.run node-host execution feature where attackers can rewrite command-line arguments (argv) to change the semantics of operator-approved commands. An authenticated local attacker with low privileges can place malicious scripts in the working directory to execute unintended code despite the operator approving different command text, resulting in high-impact confidentiality, integrity, and availability violations. A patch is available from the vendor, and no public exploit code has been widely reported, but the vulnerability represents a critical trust boundary violation in approval workflows.

Information Disclosure Openclaw
NVD GitHub VulDB
CVE-2026-28461
EPSS 0% CVSS 7.5
HIGH PATCH This Week

OpenClaw contains an unbounded memory growth vulnerability in its Zalo webhook endpoint that allows unauthenticated remote attackers to exhaust system memory through query string manipulation. OpenClaw versions prior to 2026.3.1 are affected. Attackers can send repeated HTTP requests with varying query parameters to trigger in-memory key accumulation, leading to memory pressure, process instability, or complete denial of service through out-of-memory conditions.

Denial Of Service Openclaw
NVD GitHub VulDB
CVE-2026-27670
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

OpenClaw versions before 2026.3.2 are vulnerable to a race condition in ZIP extraction that permits local attackers with limited privileges to write arbitrary files outside the intended extraction directory. By manipulating symlinks between path validation and write operations, an attacker can achieve arbitrary file placement on the system. A patch is available to resolve this integrity issue.

Information Disclosure Openclaw
NVD GitHub VulDB
CVE-2026-27566
EPSS 0% CVSS 7.1
HIGH PATCH This Week

OpenClaw contains an allowlist bypass vulnerability in its system.run exec analysis that fails to properly unwrap wrapper binaries like env and bash. Attackers with low-level privileges can chain wrapper binaries to smuggle malicious commands that appear to satisfy allowlist entries while actually executing non-allowlisted payloads. A patch is available from the vendor, and the vulnerability was disclosed through VulnCheck advisory; no public proof-of-concept code or active exploitation (KEV listing) has been reported at this time.

Command Injection Openclaw
NVD GitHub VulDB
CVE-2026-22176
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.19 allow local authenticated users to execute arbitrary commands by injecting shell metacharacters into environment variable values during Windows Scheduled Task script generation. The vulnerability stems from unquoted variable assignments in gateway.cmd that fail to sanitize special characters like &, |, ^, %, and !, enabling command injection when the task script runs. A patch is available to address this local privilege escalation risk.

Command Injection Microsoft Openclaw +1
NVD GitHub VulDB
CVE-2026-27545
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.26 contain a Time-of-Check-Time-of-Use (TOCTOU) approval bypass vulnerability in the system.run execution function that allows local attackers with low privileges to execute arbitrary commands from unintended filesystem locations. An attacker can exploit a race condition by modifying parent symlinks in the current working directory after command approval but before execution, redirecting execution while maintaining the appearance of a safe working directory. A patch is available from the vendor, and this vulnerability has been documented by both VulnCheck and the OpenClaw security advisory (GHSA-f7ww-2725-qvw2).

Authentication Bypass Openclaw
NVD GitHub VulDB
CVE-2026-27523
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.24 contain a sandbox bind validation bypass vulnerability that allows local attackers with low privileges to circumvent allowed-root and blocked-path security checks through symlinked parent directories combined with non-existent leaf paths. An attacker can craft bind source paths that appear to reside within permitted sandbox roots but resolve outside sandbox boundaries once missing path components are created, effectively weakening the sandbox's bind-source isolation enforcement. A patch is available from the vendor, and exploitation requires local access with standard user privileges, making this a practical threat in multi-tenant or shared-system environments.

Path Traversal Openclaw
NVD GitHub VulDB
CVE-2026-27522
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability that allows authenticated attackers to read arbitrary files from the host system through the sendAttachment and setGroupIcon message actions when sandboxRoot configuration is unset. An attacker with valid credentials can exploit path traversal to hydrate media from absolute file paths, gaining unauthorized access to sensitive files accessible by the OpenClaw runtime user. A patch is available from the vendor, and this vulnerability has been tracked in the ENISA EUVD database (EUVD-2026-12732) with confirmed GitHub security advisory and commit-level patch information.

Path Traversal Openclaw
NVD GitHub VulDB
CVE-2026-22178
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.19 are vulnerable to regex injection and denial of service through unescaped Feishu mention metadata in the stripBotMention function. An unauthenticated network attacker can craft malicious mention metadata containing nested-quantifier patterns or regex metacharacters to trigger catastrophic backtracking, block message processing, or remove unintended content before model processing, with a CVSS score of 6.5 indicating medium severity with integrity and availability impact. Patch availability exists from the vendor via GitHub commits, and proof-of-concept details are available through VulnCheck advisory references.

Denial Of Service Openclaw
NVD GitHub VulDB
CVE-2026-22175
EPSS 0% CVSS 7.1
HIGH PATCH This Week

OpenClaw contains an execution approval bypass vulnerability in allowlist mode that allows authenticated attackers to circumvent allow-always grants through unrecognized multiplexer shell wrappers like busybox and toybox. Attackers with low-level privileges can invoke arbitrary payloads under these multiplexer wrappers to satisfy stored allowlist rules while executing unintended commands. This affects all OpenClaw versions prior to 2026.2.23, with a patch now available from the vendor.

Authentication Bypass Openclaw
NVD GitHub VulDB
CVE-2026-22171
EPSS 0% CVSS 8.2
HIGH PATCH This Week

OpenClaw contains a path traversal vulnerability in the Feishu media download functionality where untrusted media key values are directly interpolated into temporary file paths without sanitization. OpenClaw versions prior to 2026.2.19 are affected, allowing remote unauthenticated attackers to write arbitrary files within the process permissions by using directory traversal sequences in media keys. No public evidence of active exploitation (KEV) or public proof-of-concept exists at this time, though the high CVSS score of 8.2 reflects the network-accessible attack vector and lack of authentication requirements.

Path Traversal Openclaw
NVD GitHub VulDB
CVE-2026-22168
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw versions prior to 2026.2.21 contain an approval-integrity mismatch vulnerability in the system.run function that allows authenticated operators to execute arbitrary commands on Windows systems by appending malicious arguments after cmd.exe /c while the approval audit log records only the benign command text. An authenticated attacker with operator privileges can exploit this to achieve local command execution on trusted Windows nodes with mismatched or incomplete audit trails, enabling information disclosure and lateral movement while evading detection.

Information Disclosure Microsoft Openclaw +1
NVD GitHub VulDB
CVE-2026-4039
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Code injection in OpenClaw 2026.2.19 and earlier through the Skill Env Handler's applySkillConfigenvOverrides function allows authenticated remote attackers to execute arbitrary code with low integrity and confidentiality impact. An authenticated user can manipulate environment configuration settings to inject malicious code that executes in the context of the application. Mitigation requires upgrading to version 2026.2.21-beta.1 or later, as no official patch is currently available for production releases.

Code Injection Openclaw
NVD GitHub VulDB
CVE-2026-30741
EPSS 0% CVSS 9.8
CRITICAL Act Now

RCE in OpenClaw Agent Platform v2026.2.6 via prompt injection.

RCE Code Injection Openclaw
NVD GitHub VulDB
CVE-2026-32063
EPSS 0% CVSS 7.1
HIGH PATCH This Week

OpenClaw versions prior to 2026.2.21 allow local attackers with limited privileges to inject arbitrary systemd directives through unvalidated environment variables in unit file generation, enabling command execution with gateway service privileges. By manipulating config.env.vars and triggering service installation or restart, an attacker can bypass Environment= line constraints via newline injection to achieve arbitrary code execution. No patch is currently available for this command injection vulnerability.

Command Injection Openclaw
NVD GitHub VulDB
CVE-2026-32061
EPSS 0% CVSS 4.4
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.17 allow privileged users with config modification access to read arbitrary files on the system through path traversal in the $include directive. An attacker in this position can exploit absolute paths, directory traversal sequences, or symlinks to access sensitive data like API keys and credentials that the OpenClaw process can read. No patch is currently available for this medium-severity vulnerability.

Path Traversal Openclaw
NVD GitHub VulDB
CVE-2026-32060
EPSS 0% CVSS 8.8
HIGH PATCH This Week

OpenClaw versions before 2026.2.14 allow authenticated attackers to bypass filesystem restrictions in the apply_patch function through path traversal, enabling arbitrary file write and deletion operations outside the intended workspace. The vulnerability requires an authenticated user but no additional user interaction, and affects systems with apply_patch enabled without sandbox containment. No patch is currently available.

Path Traversal Openclaw
NVD GitHub VulDB
CVE-2026-32059
EPSS 0% CVSS 8.8
HIGH PATCH This Week

OpenClaw version 2026.2.22-2 versions up to 2026.2.23 is affected by incorrect authorization (CVSS 8.8).

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-29613
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

Openclaw versions up to 2026.2.12 is affected by missing authentication for critical function (CVSS 5.9).

React Openclaw
NVD GitHub
CVE-2026-29612
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Openclaw versions up to 2026.2.14 is affected by allocation of resources without limits or throttling (CVSS 5.5).

Denial Of Service Openclaw
NVD GitHub
CVE-2026-29611
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Openclaw versions up to 2026.2.14 contains a vulnerability that allows attackers to read arbitrary files from the local filesystem (CVSS 7.5).

Lfi Openclaw
NVD GitHub
CVE-2026-29610
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Arbitrary command execution in OpenClaw prior to version 2026.2.14 stems from improper PATH validation during node-host execution and project bootstrapping, allowing authenticated attackers or those with local filesystem access to substitute malicious binaries for legitimate commands. An attacker can exploit this to bypass allowlisted command restrictions and achieve code execution with the privileges of the OpenClaw process. A patch is available for versions 2026.2.14 and later.

Privilege Escalation Openclaw
NVD GitHub
CVE-2026-29609
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Openclaw versions up to 2026.2.14 is affected by allocation of resources without limits or throttling (CVSS 7.5).

Denial Of Service Openclaw
NVD GitHub
CVE-2026-29606
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Openclaw versions up to 2026.2.14 is affected by missing authentication for critical function (CVSS 6.5).

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-28486
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw versions 2026.1.16 through 2026.2.13 allow local attackers to write arbitrary files outside intended directories by supplying malicious archives to the skills, hooks, plugins, or signal installation commands. Successful exploitation enables attackers to achieve code execution or establish persistence on affected systems. A patch is available for affected users.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28485
EPSS 0% CVSS 8.4
HIGH PATCH This Week

Openclaw versions up to 2026.2.12 is affected by missing authentication for critical function (CVSS 8.4).

Authentication Bypass RCE Openclaw
NVD GitHub
CVE-2026-28481
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw versions 2026.1.30 and earlier leak authentication bearer tokens to untrusted domains when the optional MS Teams attachment downloader extension is enabled, due to overly permissive suffix-based domain allowlisting during download retries. An attacker could harvest these tokens from allowed domains to compromise authenticated sessions. No patch is currently available, affecting users of the vulnerable versions.

Information Disclosure Openclaw
NVD GitHub VulDB
CVE-2026-28480
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw prior to version 2026.2.14 fails to properly validate Telegram allowlist entries by accepting mutable usernames instead of immutable user IDs, enabling attackers to register recycled usernames and bypass access controls. An unauthenticated attacker can exploit this flaw to impersonate legitimate users and send unauthorized commands to OpenClaw bots. No patch is currently available.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-28479
EPSS 0% CVSS 7.5
HIGH PATCH This Week

OpenClaw versions up to 2026.2.15 is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Docker Information Disclosure Openclaw
NVD GitHub VulDB
CVE-2026-28478
EPSS 0% CVSS 7.5
HIGH PATCH This Week

OpenClaw versions up to 2026.2.13 is affected by allocation of resources without limits or throttling (CVSS 7.5).

Denial Of Service Openclaw
NVD GitHub
CVE-2026-28477
EPSS 0% CVSS 7.1
HIGH PATCH This Week

OpenClaw versions before 2026.2.14 fail to properly validate OAuth state parameters in the Chutes login flow, allowing attackers to bypass CSRF protections and hijack user sessions. An attacker can trick a user into pasting malicious OAuth callback data to gain unauthorized access and maintain persistent tokens under a compromised account. No patch is currently available for this high-severity vulnerability.

CSRF Openclaw
NVD GitHub
CVE-2026-28475
EPSS 0% CVSS 4.8
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.13 are vulnerable to timing side-channel attacks on hook token validation due to use of non-constant-time string comparison. Remote attackers can exploit this weakness by measuring response times across multiple requests to gradually recover authentication tokens for the hooks endpoint. This affects confidentiality and integrity of OpenClaw deployments accessible over the network.

Information Disclosure Openclaw
NVD GitHub
CVE-2026-28473
EPSS 0% CVSS 8.1
HIGH PATCH This Week

OpenClaw prior to version 2026.2.2 allows authenticated users with operator.write scope to bypass approval controls and resolve execution requests through a chat command that circumvents authorization checks. An attacker with this scope can approve or deny exec approval requests without having the required operator.approvals permission, effectively gaining unauthorized approval authority. A patch is available for affected installations.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-28472
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Openclaw versions up to 2026.2.2 is affected by missing authentication for critical function (CVSS 8.1).

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-28471
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

OpenClaw versions 2026.1.14-1 through 2026.2.1 with the Matrix plugin enabled fail to validate homeserver identity when checking direct message allowlists, allowing remote attackers to impersonate authorized users by spoofing display names or local identifiers from different homeservers. This bypass enables unauthorized access to routing and agent pipelines for authenticated Matrix users on remote servers. A patch is available in version 2026.2.2 and later.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-28469
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Openclaw versions up to 2026.2.14 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Industrial Openclaw
NVD GitHub
CVE-2026-28468
EPSS 0% CVSS 7.7
HIGH PATCH This Week

Openclaw versions up to 2026.2.14 is affected by missing authentication for critical function (CVSS 7.7).

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-28467
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenClaw prior to version 2026.2.2 is vulnerable to server-side request forgery through its attachment and media URL processing, allowing unauthenticated remote attackers to make arbitrary HTTP requests to internal resources. Attackers can exploit model-controlled message features to trigger the SSRF and exfiltrate response data as outbound attachments. Public exploit code exists for this vulnerability.

SSRF AI / ML Openclaw
NVD GitHub
CVE-2026-28466
EPSS 0% CVSS 9.9
CRITICAL PATCH Act Now

Gateway authorization bypass in OpenClaw before 2026.2.14. Unsanitized approval fields in node.invoke. Patch available.

Authentication Bypass RCE Openclaw
NVD GitHub
CVE-2026-28465
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

OpenClaw voice-call plugin versions before 2026.2.3 allow remote attackers to forge webhook events by exploiting improper authentication in reverse-proxy environments where forwarded headers are implicitly trusted. An unauthenticated attacker can manipulate Forwarded or X-Forwarded-* headers to bypass webhook verification and spoof legitimate events. A patch is available to address this authentication bypass vulnerability.

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-28464
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.12 are vulnerable to timing-based token extraction attacks due to non-constant-time string comparison in hook authentication. A network-based attacker can exploit this side-channel vulnerability to gradually recover the hook validation token through repeated timing measurements across multiple requests. The vulnerability requires repeated probing but poses a confidentiality risk to systems using vulnerable versions.

Information Disclosure Openclaw
NVD GitHub
CVE-2026-28462
EPSS 0% CVSS 7.5
HIGH PATCH This Week

OpenClaw versions before 2026.2.13 suffer from a path traversal vulnerability in the browser control API that allows authenticated attackers to write arbitrary files outside designated temporary directories via the trace and download endpoints. An attacker with API access can exploit this to place malicious files in unintended locations on the system. A patch is available to address this high-severity flaw.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28459
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Arbitrary file write in OpenClaw prior to version 2026.2.12 allows authenticated gateway clients to bypass path validation on the sessionFile parameter and write transcript data to any location on the host filesystem. An attacker with valid credentials can repeatedly append data to arbitrary files, potentially corrupting configurations or exhausting disk space to cause denial of service. A patch is available.

Denial Of Service Openclaw
NVD GitHub
CVE-2026-28458
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Openclaw versions up to 2026.2.1 is affected by missing authentication for critical function (CVSS 8.1).

Authentication Bypass Information Disclosure Openclaw
NVD GitHub
CVE-2026-28457
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.14 allow local attackers to write arbitrary files outside the sandbox directory through path traversal sequences in crafted skill package names when sandbox skill mirroring is enabled. An attacker can exploit this by providing a malicious skill package with traversal patterns like ../ or absolute paths in the frontmatter name parameter, potentially compromising system integrity. A patch is available to remediate this vulnerability.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28456
EPSS 0% CVSS 7.2
HIGH PATCH This Week

Improper path validation in OpenClaw Gateway versions before 2026.2.14 enables authenticated administrators to achieve arbitrary code execution by manipulating hook module paths passed to dynamic imports. An attacker with configuration modification privileges can load and execute malicious local modules within the Node.js process, gaining full system compromise capabilities.

Node.js Openclaw
NVD GitHub
CVE-2026-28454
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Openclaw versions up to 2026.2.2 is affected by insufficient verification of data authenticity (CVSS 7.5).

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-28453
EPSS 0% CVSS 7.5
HIGH PATCH This Week

OpenClaw before version 2026.2.14 fails to properly validate file paths when extracting TAR archives, enabling attackers to use path traversal sequences to write files outside the intended extraction directory. An unauthenticated remote attacker can exploit this to overwrite configuration files or inject malicious code into the system. A patch is available for affected versions.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28452
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Openclaw versions up to 2026.2.14 is affected by allocation of resources without limits or throttling (CVSS 5.5).

Denial Of Service Openclaw
NVD GitHub
CVE-2026-28451
EPSS 0% CVSS 8.3
HIGH PATCH This Week

OpenClaw versions before 2026.2.14 contain unprotected server-side request forgery flaws in the Feishu extension that enable remote attackers to access internal services and exfiltrate data without authentication. Attackers can exploit the sendMediaFeishu function and markdown image processing through direct manipulation or prompt injection to force the application to fetch attacker-controlled URLs and re-upload responses as Feishu media. A patch is available to remediate this network-accessible vulnerability affecting AI/ML deployments.

SSRF AI / ML Openclaw
NVD GitHub
CVE-2026-28450
EPSS 0% CVSS 6.8
MEDIUM PATCH This Month

OpenClaw versions before 2026.2.12 with the Nostr plugin enabled contain unauthenticated API endpoints that allow remote attackers to read and modify Nostr profiles without authentication when the gateway HTTP port is network-accessible. Attackers can exploit this to steal sensitive profile data, alter gateway configuration, and sign malicious Nostr events using the bot's private key. A patch is available for affected installations.

Authentication Bypass Information Disclosure Openclaw
NVD GitHub
CVE-2026-28448
EPSS 0% CVSS 7.3
HIGH POC PATCH This Week

OpenClaw versions before 2026.2.1 fail to properly validate access controls in the Twitch plugin when role restrictions are not configured, allowing unauthenticated remote attackers to trigger agent dispatch through Twitch chat mentions. Public exploit code exists for this vulnerability, enabling attackers to invoke the agent pipeline and potentially cause unintended actions or resource exhaustion. Organizations running affected versions with the Twitch plugin enabled should apply the available patch immediately.

Denial Of Service Authentication Bypass AI / ML +1
NVD GitHub
CVE-2026-28447
EPSS 0% CVSS 8.1
HIGH PATCH This Week

OpenClaw 2026.1.29-beta.1 through 2026.2.0 is vulnerable to path traversal during plugin installation, enabling attackers to write arbitrary files outside the intended extensions directory by crafting malicious package names with traversal sequences. An unauthenticated attacker can exploit this when users execute the plugin install command, potentially achieving arbitrary file write capabilities on the affected system. A patch is available in version 2026.2.1.

Path Traversal Openclaw
NVD GitHub
CVE-2026-28446
EPSS 1% CVSS 9.4
CRITICAL POC PATCH Act Now

Auth bypass in OpenClaw voice-call extension before 2026.2.1. EPSS 0.68%. PoC and patch available.

Authentication Bypass AI / ML Openclaw
NVD GitHub
CVE-2026-28395
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw Chrome extension relay server versions prior to 2026.2.12 improperly bind to all network interfaces when wildcard cdpUrl values are configured, enabling remote attackers to discover service endpoints and port information. An attacker can exploit this exposure to conduct denial-of-service attacks and brute-force attempts against the relay token authentication mechanism without requiring local access.

Dns Openclaw Chrome
NVD GitHub
CVE-2026-28394
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Openclaw versions up to 2026.2.15 is affected by allocation of resources without limits or throttling (CVSS 6.5).

Denial Of Service Openclaw
NVD GitHub
Page 1 of 2 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy