6.9

CVSS4.0

CVE-2026-41301 - OpenClaw 2026.3.22 < 2026.3.31 - Forged Nostr DM Pairing State Creation via Signature Verification …

OpenClaw versions 2026.3.22 before 2026.3.31 contain a signature verification bypass vulnerability in the Nostr DM ingress path that allows pairing challenges to be issued before event signature validation. An unauthenticated remote attacker can send forged direct messages to create pending pairing…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 21, 2026, 4:20 p.m.

6.9

CVSS4.0

CVE-2026-41300 - OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Preservation in Remote Onboarding

OpenClaw before 2026.3.31 contains a trust-decline vulnerability that preserves attacker-discovered endpoints in remote onboarding flows. Attackers can route gateway credentials to malicious endpoints by having their discovered URL survive the trust decline process into manual prompts requiring ope…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 21, 2026, 4:20 p.m.

7.1

CVSS4.0

CVE-2026-41299 - OpenClaw < 2026.3.28 - Client Identity Spoofing in chat.send Gateway Provenance Guard

OpenClaw before 2026.3.28 contains an authorization bypass vulnerability in the chat.send gateway method where ACP-only provenance fields are gated by self-declared client metadata from WebSocket handshake rather than verified authorization state. Authenticated operator clients can spoof ACP identi…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 21, 2026, 4:20 p.m.

5.3

CVSS4.0

CVE-2026-41298 - OpenClaw < 2026.4.2 - Authorization Bypass in Session Termination Endpoint

OpenClaw before 2026.4.2 fails to enforce write scopes on the POST /sessions/:sessionKey/kill endpoint in identity-bearing HTTP modes. Read-scoped callers can terminate running subagent sessions by sending requests to this endpoint, bypassing authorization controls.

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 21, 2026, 11:30 p.m.

4.8

CVSS4.0

CVE-2026-41297 - OpenClaw < 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect

OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive dow…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 21, 2026, 4:20 p.m.

8.8

CVSS4.0

CVE-2026-41296 - OpenClaw < 2026.3.31 - Sandbox Escape via TOCTOU Race in Remote FS Bridge readFile

OpenClaw before 2026.3.31 contains a time-of-check-time-of-use race condition in the remote filesystem bridge readFile function that allows sandbox escape. Attackers can exploit the separate path validation and file read operations to bypass sandbox restrictions and read arbitrary files.

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 21, 2026, 7:49 p.m.

8.5

CVSS4.0

CVE-2026-41295 - OpenClaw < 2026.4.2 - Untrusted Workspace Channel Shadow Code Execution during Built-in Channel Set…

OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability allowing untrusted workspace channel shadows to execute during built-in channel setup and login. Attackers can clone a workspace with a malicious plugin claiming a bundled channel id to achieve unintended in-process code exe…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 21, 2026, 4:20 p.m.

8.5

CVSS4.0

CVE-2026-41294 - OpenClaw < 2026.3.28 - Environment Variable Injection via CWD .env File

OpenClaw before 2026.3.28 loads the current working directory .env file before trusted state-dir configuration, allowing environment variable injection. Attackers can place a malicious .env file in a repository or workspace to override runtime configuration and security-sensitive environment settin…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 21, 2026, 4:20 p.m.

5.9

CVSS4.0

CVE-2026-40045 - OpenClaw < 2026.4.2 - Cleartext Credential Transmission via Unencrypted WebSocket Gateway Endpoints

OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials.

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:03 p.m.

5.3

CVSS4.0

CVE-2026-34082 - Dify has IDOR in deleting someone else's chat conversation

Dify is an open-source LLM app development platform. Prior to 1.13.1, the method `DELETE /console/api/installed-apps/<appId>/conversations/<conversationId>` has poor authorization checking and allows any Dify-authenticated user to delete someone else's chat history. Version 1.13.1 patches the issue.

πŸ“… Published: April 20, 2026, 11:03 p.m. πŸ”„ Last Modified: April 23, 2026, 3:12 p.m.
Total resulsts: 346758
Page 140 of 34,676
Β« previous page Β» next page
Filters