7.1

CVSS4.0

CVE-2026-35668 - OpenClaw < 2026.3.24 - Sandbox Media Root Bypass via Unnormalized mediaUrl and fileUrl Parameters

OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit incomplete parameter validation in normalizeSandboxMedi…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 6:27 p.m.

6.9

CVSS4.0

CVE-2026-35667 - OpenClaw < 2026.3.24 - Improper Process Termination via Unpatched killProcessTree in shell-utils.ts

OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-27486 where the !stop chat command uses an unpatched killProcessTree function from shell-utils.ts that sends SIGKILL immediately without graceful SIGTERM shutdown. Attackers can trigger process termination via the !stop command, caus…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 8:17 p.m.

7.7

CVSS4.0

CVE-2026-35666 - OpenClaw < 2026.3.22 - Allowlist Bypass via Unregistered Time Dispatch Wrapper

OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.run approvals that fails to unwrap /usr/bin/time wrappers. Attackers can bypass executable binding restrictions by using an unregistered time wrapper to reuse approval state for inner commands.

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

6.9

CVSS4.0

CVE-2026-35665 - OpenClaw < 2026.3.24 - Denial of Service via Feishu Webhook Pre-Auth Body Parsing

OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request bodies with permissive limits of 1MB and 30-second timeout before signature verification. An unauthenticated attacker can exhaust server connection resources by sending concurren…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

6.9

CVSS4.0

CVE-2026-35664 - OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Card Callbacks

OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization.

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

8.7

CVSS4.0

CVE-2026-35663 - OpenClaw < 2026.3.25 - Privilege Escalation via Backend Reconnect Scope Self-Claim

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unauthorized administrative privileges.

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

5.3

CVSS4.0

CVE-2026-35662 - OpenClaw < 2026.3.22 - Missing controlScope Enforcement in Send Action

OpenClaw before 2026.3.22 fails to enforce controlScope restrictions on the send action, allowing leaf subagents to message controlled child sessions beyond their authorized scope. Attackers can exploit this by using the send action to communicate with child sessions without proper scope validation…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 6:24 p.m.

6.9

CVSS4.0

CVE-2026-35661 - OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Button Callback Authorization Bypass

OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Telegram callback query handling that allows attackers to mutate session state without satisfying normal DM pairing requirements. Remote attackers can exploit weaker callback-only authorization in direct messages to bypass …

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 8:18 p.m.

7.2

CVSS4.0

CVE-2026-35660 - OpenClaw < 2026.3.23 - Insufficient Access Control in Gateway Agent Session Reset

OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions. Attackers with operator.write privileges can invoke /reset or /new messages with an explicit sessionKey to…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

5.1

CVSS4.0

CVE-2026-35659 - OpenClaw < 2026.3.22 - Unresolved Service Metadata Routing via Bonjour and DNS-SD Discovery

OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT metadata from Bonjour and DNS-SD could influence CLI routing even when actual service resolution failed. Attackers can exploit unresolved hints to steer routing decisions to unintended targets by providing malicious disc…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.
Total resulsts: 343946
Page 14 of 34,395
« previous page » next page
Filters