6.3

CVSS4.0

CVE-2026-28471 - OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart M…

OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate all…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 16, 2026, noon

9.2

CVSS4.0

CVE-2026-28470 - OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double Quotes

OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection by embedding unescaped $() or backticks inside d…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 22, 2026, 6:51 p.m.

8.2

CVSS4.0

CVE-2026-28469 - OpenClaw < 2026.2.14 - Cross-Account Policy Context Misrouting via Shared Webhook Path Ambiguity

OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process i…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 17, 2026, 12:45 p.m.

8.5

CVSS4.0

CVE-2026-28468 - OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSo…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 16, 2026, noon

6.3

CVSS4.0

CVE-2026-28467 - OpenClaw < 2026.2.2 - SSRF via Attachment Media URL Hydration

OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlled sendAttachment or auto-reply mechanisms can tri…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 17, 2026, 12:45 p.m.

9.4

CVSS4.0

CVE-2026-28466 - OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass

OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attackers with valid gateway credentials can inject ap…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 16, 2026, 12:15 p.m.

8.2

CVSS4.0

CVE-2026-28465 - OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers

OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* …

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 16, 2026, 4:45 a.m.

8.2

CVSS4.0

CVE-2026-28464 - OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually d…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 16, 2026, 12:15 p.m.

8.6

CVSS4.0

CVE-2026-28463 - OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist

OpenClaw versions prior to 2026.2.14 contain an arbitrary file read vulnerability in the exec-approvals allowlist validation that checks pre-expansion argv tokens but executes using real shell expansion. Attackers with authorization or through prompt-injection attacks can exploit safe binaries like…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 21, 2026, 2:43 a.m.

8.7

CVSS4.0

CVE-2026-28462 - OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths

OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: April 16, 2026, 12:15 p.m.
Total resulsts: 346445
Page 1020 of 34,645
Β« previous page Β» next page
Filters