7.7

CVSS4.0

CVE-2026-35666 - OpenClaw < 2026.3.22 - Allowlist Bypass via Unregistered Time Dispatch Wrapper

OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.run approvals that fails to unwrap /usr/bin/time wrappers. Attackers can bypass executable binding restrictions by using an unregistered time wrapper to reuse approval state for inner commands.

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.

6.9

CVSS4.0

CVE-2026-35665 - OpenClaw < 2026.3.24 - Denial of Service via Feishu Webhook Pre-Auth Body Parsing

OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request bodies with permissive limits of 1MB and 30-second timeout before signature verification. An unauthenticated attacker can exhaust server connection resources by sending concurren…

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.

6.9

CVSS4.0

CVE-2026-35664 - OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Card Callbacks

OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization.

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.

8.7

CVSS4.0

CVE-2026-35663 - OpenClaw < 2026.3.25 - Privilege Escalation via Backend Reconnect Scope Self-Claim

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unauthorized administrative privileges.

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.

5.3

CVSS4.0

CVE-2026-35662 - OpenClaw < 2026.3.22 - Missing controlScope Enforcement in Send Action

OpenClaw before 2026.3.22 fails to enforce controlScope restrictions on the send action, allowing leaf subagents to message controlled child sessions beyond their authorized scope. Attackers can exploit this by using the send action to communicate with child sessions without proper scope validation…

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 6:24 p.m.

6.9

CVSS4.0

CVE-2026-35661 - OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Button Callback Authorization Bypass

OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Telegram callback query handling that allows attackers to mutate session state without satisfying normal DM pairing requirements. Remote attackers can exploit weaker callback-only authorization in direct messages to bypass …

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 8:18 p.m.

7.2

CVSS4.0

CVE-2026-35660 - OpenClaw < 2026.3.23 - Insufficient Access Control in Gateway Agent Session Reset

OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions. Attackers with operator.write privileges can invoke /reset or /new messages with an explicit sessionKey to…

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.

5.1

CVSS4.0

CVE-2026-35659 - OpenClaw < 2026.3.22 - Unresolved Service Metadata Routing via Bonjour and DNS-SD Discovery

OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT metadata from Bonjour and DNS-SD could influence CLI routing even when actual service resolution failed. Attackers can exploit unresolved hints to steer routing decisions to unintended targets by providing malicious disc…

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.

6

CVSS4.0

CVE-2026-35658 - OpenClaw < 2026.3.2 - Filesystem Boundary Bypass in Image Tool

OpenClaw before 2026.3.2 contains a filesystem boundary bypass vulnerability in the image tool that fails to honor tools.fs.workspaceOnly restrictions. Attackers can traverse sandbox bridge mounts outside the workspace to read files that other filesystem tools would reject.

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.

5.9

CVSS3.1

CVE-2026-35597 - Vikunja Affected by TOTP Brute-Force Due to Non-Functional Account Lockout

Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the TOTP failed-attempt lockout mechanism is non-functional due to a database transaction handling bug. When a TOTP validation fails, the login handler in pkg/routes/api/v1/login.go calls HandleFailedTOTPAuth and then u…

πŸ“… Published: April 10, 2026, 4:03 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.
Total resulsts: 343924
Page 12 of 34,393
Β« previous page Β» next page
Filters