6

CVSS4.0

CVE-2026-35670 - OpenClaw < 2026.3.22 - Webhook Reply Rebinding via Username Resolution in Synology Chat

OpenClaw before 2026.3.22 contains a webhook reply delivery vulnerability that allows attackers to rebind chat replies to unintended users by exploiting mutable username matching instead of stable numeric user identifiers. Attackers can manipulate username changes to redirect webhook-triggered repl…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

8.7

CVSS4.0

CVE-2026-35669 - OpenClaw < 2026.3.25 - Privilege Escalation via Gateway Plugin HTTP Authentication Scope

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in gateway-authenticated plugin HTTP routes that incorrectly mint operator.admin runtime scope regardless of caller-granted scopes. Attackers can exploit this scope boundary bypass to gain elevated privileges and perform unauth…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

7.1

CVSS4.0

CVE-2026-35668 - OpenClaw < 2026.3.24 - Sandbox Media Root Bypass via Unnormalized mediaUrl and fileUrl Parameters

OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit incomplete parameter validation in normalizeSandboxMedi…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 6:27 p.m.

6.9

CVSS4.0

CVE-2026-35667 - OpenClaw < 2026.3.24 - Improper Process Termination via Unpatched killProcessTree in shell-utils.ts

OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-27486 where the !stop chat command uses an unpatched killProcessTree function from shell-utils.ts that sends SIGKILL immediately without graceful SIGTERM shutdown. Attackers can trigger process termination via the !stop command, caus…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 8:17 p.m.

7.7

CVSS4.0

CVE-2026-35666 - OpenClaw < 2026.3.22 - Allowlist Bypass via Unregistered Time Dispatch Wrapper

OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.run approvals that fails to unwrap /usr/bin/time wrappers. Attackers can bypass executable binding restrictions by using an unregistered time wrapper to reuse approval state for inner commands.

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

6.9

CVSS4.0

CVE-2026-35665 - OpenClaw < 2026.3.24 - Denial of Service via Feishu Webhook Pre-Auth Body Parsing

OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request bodies with permissive limits of 1MB and 30-second timeout before signature verification. An unauthenticated attacker can exhaust server connection resources by sending concurren…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

6.9

CVSS4.0

CVE-2026-35664 - OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Card Callbacks

OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization.

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

8.7

CVSS4.0

CVE-2026-35663 - OpenClaw < 2026.3.25 - Privilege Escalation via Backend Reconnect Scope Self-Claim

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unauthorized administrative privileges.

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

5.3

CVSS4.0

CVE-2026-35662 - OpenClaw < 2026.3.22 - Missing controlScope Enforcement in Send Action

OpenClaw before 2026.3.22 fails to enforce controlScope restrictions on the send action, allowing leaf subagents to message controlled child sessions beyond their authorized scope. Attackers can exploit this by using the send action to communicate with child sessions without proper scope validation…

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 6:24 p.m.

6.9

CVSS4.0

CVE-2026-35661 - OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Button Callback Authorization Bypass

OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Telegram callback query handling that allows attackers to mutate session state without satisfying normal DM pairing requirements. Remote attackers can exploit weaker callback-only authorization in direct messages to bypass …

📅 Published: April 10, 2026, 4:03 p.m. 🔄 Last Modified: April 10, 2026, 8:18 p.m.
Total resulsts: 343968
Page 16 of 34,397
« previous page » next page
Filters