8.2

CVSS4.0

CVE-2026-28465 - OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers

OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* …

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

8.2

CVSS4.0

CVE-2026-28464 - OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually d…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

8.6

CVSS4.0

CVE-2026-28463 - OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist

OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit thi…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

8.7

CVSS4.0

CVE-2026-28462 - OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths

OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

7.1

CVSS4.0

CVE-2026-28459 - OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile Path

OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

7.4

CVSS4.0

CVE-2026-28458 - OpenClaw 2026.1.20 < 2026.2.1 - Missing Authentication in Browser Relay /cdp WebSocket Endpoint

OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopback and access sensitive data. Attackers can exploit…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

5.6

CVSS4.0

CVE-2026-28457 - OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences …

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

8.6

CVSS4.0

CVE-2026-28456 - OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path Handling

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and exe…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

8.2

CVSS4.0

CVE-2026-28454 - OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram Webhook

OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can forge Telegram updates by spoofing message.from.id …

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.

8.3

CVSS4.0

CVE-2026-28453 - OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction

OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ../../ to write files outside extraction boundaries,…

πŸ“… Published: March 5, 2026, 9:59 p.m. πŸ”„ Last Modified: March 5, 2026, 9:59 p.m.
Total resulsts: 336339
Page 14 of 33,634
Β« previous page Β» next page
Filters