6.9

CVSS4.0

CVE-2026-41300 - OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Preservation in Remote Onboarding

OpenClaw before 2026.3.31 contains a trust-decline vulnerability that preserves attacker-discovered endpoints in remote onboarding flows. Attackers can route gateway credentials to malicious endpoints by having their discovered URL survive the trust decline process into manual prompts requiring ope…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 20, 2026, 11:08 p.m.

7.1

CVSS4.0

CVE-2026-41299 - OpenClaw < 2026.3.28 - Client Identity Spoofing in chat.send Gateway Provenance Guard

OpenClaw before 2026.3.28 contains an authorization bypass vulnerability in the chat.send gateway method where ACP-only provenance fields are gated by self-declared client metadata from WebSocket handshake rather than verified authorization state. Authenticated operator clients can spoof ACP identi…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 20, 2026, 11:08 p.m.

5.3

CVSS4.0

CVE-2026-41298 - OpenClaw < 2026.4.2 - Authorization Bypass in Session Termination Endpoint

OpenClaw before 2026.4.2 fails to enforce write scopes on the POST /sessions/:sessionKey/kill endpoint in identity-bearing HTTP modes. Read-scoped callers can terminate running subagent sessions by sending requests to this endpoint, bypassing authorization controls.

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 20, 2026, 11:08 p.m.

4.8

CVSS4.0

CVE-2026-41297 - OpenClaw < 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect

OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive dow…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 20, 2026, 11:08 p.m.

8.8

CVSS4.0

CVE-2026-41296 - OpenClaw < 2026.3.31 - Sandbox Escape via TOCTOU Race in Remote FS Bridge readFile

OpenClaw before 2026.3.31 contains a time-of-check-time-of-use race condition in the remote filesystem bridge readFile function that allows sandbox escape. Attackers can exploit the separate path validation and file read operations to bypass sandbox restrictions and read arbitrary files.

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 20, 2026, 11:08 p.m.

8.5

CVSS4.0

CVE-2026-41295 - OpenClaw < 2026.4.2 - Untrusted Workspace Channel Shadow Code Execution during Built-in Channel Set…

OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability allowing untrusted workspace channel shadows to execute during built-in channel setup and login. Attackers can clone a workspace with a malicious plugin claiming a bundled channel id to achieve unintended in-process code exe…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 20, 2026, 11:08 p.m.

8.5

CVSS4.0

CVE-2026-41294 - OpenClaw < 2026.3.28 - Environment Variable Injection via CWD .env File

OpenClaw before 2026.3.28 loads the current working directory .env file before trusted state-dir configuration, allowing environment variable injection. Attackers can place a malicious .env file in a repository or workspace to override runtime configuration and security-sensitive environment settin…

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 20, 2026, 11:08 p.m.

5.9

CVSS4.0

CVE-2026-40045 - OpenClaw < 2026.4.2 - Cleartext Credential Transmission via Unencrypted WebSocket Gateway Endpoints

OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials.

πŸ“… Published: April 20, 2026, 11:08 p.m. πŸ”„ Last Modified: April 20, 2026, 11:08 p.m.

5.3

CVSS4.0

CVE-2026-34082 - Dify has IDOR in deleting someone else's chat conversation

Dify is an open-source LLM app development platform. Prior to 1.13.1, the method `DELETE /console/api/installed-apps/<appId>/conversations/<conversationId>` has poor authorization checking and allows any Dify-authenticated user to delete someone else's chat history. Version 1.13.1 patches the issue.

πŸ“… Published: April 20, 2026, 11:03 p.m. πŸ”„ Last Modified: April 20, 2026, 11:03 p.m.

4.7

CVSS3.1

CVE-2026-5721 - wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin <= 6.5.0.4 - Unauthentica…

The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.5.0.4. This is due to insufficient input sanitization and output escaping in the prepareCellOutput() method of the …

πŸ“… Published: April 20, 2026, 10:25 p.m. πŸ”„ Last Modified: April 20, 2026, 10:25 p.m.
Total resulsts: 345343
Page 2 of 34,535
Β« previous page Β» next page
Filters