7.6

CVSS3.1

CVE-2026-26322 - OpenClaw Gateway tool allowed unrestricted gatewayUrl override

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets. This requires the ability to inv…

📅 Published: Feb. 19, 2026, 10:33 p.m. 🔄 Last Modified: April 17, 2026, 6 p.m.

7.5

CVSS3.1

CVE-2026-26321 - OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can influence tool calls (directly or via prompt inject…

📅 Published: Feb. 19, 2026, 10:28 p.m. 🔄 Last Modified: April 18, 2026, 6 p.m.

3.7

CVSS3.1

CVE-2026-24122 - Cosign Certificate Chain Expiry Validation Issue Allows Issuing Certificate Expiry to Be Overlooked

Cosign provides code signing and transparency for containers and binaries. In versions 3.0.4 and below, an issuing certificate with a validity that expires before the leaf certificate will be considered valid during verification even if the provided timestamp would mean the issuing certificate shou…

📅 Published: Feb. 19, 2026, 10:27 p.m. 🔄 Last Modified: April 17, 2026, 6 p.m.

7.1

CVSS4.0

CVE-2026-26320 - OpenClaw macOS deep link confirmation truncation can conceal executed agent message

OpenClaw is a personal AI assistant. OpenClaw macOS desktop client registers the `openclaw://` URL scheme. For `openclaw://agent` deep links without an unattended `key`, the app shows a confirmation dialog that previously displayed only the first 240 characters of the message, but executed the full…

📅 Published: Feb. 19, 2026, 10:24 p.m. 🔄 Last Modified: April 17, 2026, 6 p.m.

7.1

CVSS4.0

CVE-2025-8054 - Path Traversal vulnerability have been discovered in OpenText™ XM Fax.

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in OpenText™ XM Fax allows Path Traversal.  The vulnerability could allow an attacker to arbitrarily disclose content of files on the local filesystem. This issue affects XM Fax: 24.2.

📅 Published: Feb. 19, 2026, 10:21 p.m. 🔄 Last Modified: Feb. 27, 2026, 11:54 p.m.

5.3

CVSS4.0

CVE-2025-8055 - SSRF vulnerability have been discovered in OpenText™ XM Fax

Server-Side Request Forgery (SSRF) vulnerability in OpenText™ XM Fax allows Server Side Request Forgery.  The vulnerability could allow an attacker to perform blind SSRF to other systems accessible from the XM Fax server. This issue affects XM Fax: 24.2.

📅 Published: Feb. 19, 2026, 10:21 p.m. 🔄 Last Modified: Feb. 27, 2026, 11:53 p.m.

8.2

CVSS3.1

CVE-2026-21535 - Microsoft Teams Information Disclosure Vulnerability

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

📅 Published: Feb. 19, 2026, 10:06 p.m. 🔄 Last Modified: April 15, 2026, 5:15 p.m.

7.5

CVSS3.1

CVE-2026-26319 - OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests

OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated callers to forge Telnyx events. Telnyx webhooks are e…

📅 Published: Feb. 19, 2026, 10:05 p.m. 🔄 Last Modified: April 17, 2026, 6 p.m.

7.1

CVSS3.1

CVE-2026-26317 - OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints

OpenClaw is a personal AI assistant. Prior to 2026.2.14, browser-facing localhost mutation routes accepted cross-origin browser requests without explicit Origin/Referer validation. Loopback binding reduces remote exposure but does not prevent browser-initiated requests from malicious origins. A mal…

📅 Published: Feb. 19, 2026, 9:34 p.m. 🔄 Last Modified: April 18, 2026, 11:45 a.m.

7.5

CVSS3.1

CVE-2026-26316 - OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust

OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) even when the configured webhook secret was missing or …

📅 Published: Feb. 19, 2026, 9:28 p.m. 🔄 Last Modified: April 18, 2026, 11:45 a.m.
Total resulsts: 349182
Page 1543 of 34,919
« previous page » next page
Filters