8.5

CVSS4.0

CVE-2026-41387 - OpenClaw < 2026.3.22 - Supply Chain Redirection via Incomplete Host Environment Sanitization

OpenClaw before 2026.3.22 contains an incomplete host environment variable sanitization vulnerability in host-env-security-policy.json and host-env-security.ts that allows package-manager environment overrides. Attackers can exploit approved exec requests to redirect package resolution or runtime bโ€ฆ

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 30, 2026, 12:50 p.m.

9.1

CVSS4.0

CVE-2026-41386 - OpenClaw < 2026.3.22 - Privilege Escalation via Unbound Bootstrap Setup Codes

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability where bootstrap setup codes are not bound to intended device roles and scopes during pairing. Attackers can exploit this during first-use device pairing to escalate privileges beyond their intended role and scope.

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 12:49 p.m.

7.1

CVSS4.0

CVE-2026-41385 - OpenClaw < 2026.3.31 - Nostr Private Key Exposure via config.get Redaction Bypass

OpenClaw before 2026.3.31 stores Nostr privateKey as plaintext in configuration, allowing exposure through config.get method calls that bypass redaction mechanisms. Attackers can retrieve unredacted configuration data to obtain plaintext signing keys used for Nostr protocol operations.

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 28, 2026, 6:09 p.m.

8.5

CVSS4.0

CVE-2026-41384 - OpenClaw < 2026.3.24 - Environment Variable Injection via Workspace Config in CLI Backend

OpenClaw before 2026.3.24 contains an environment variable injection vulnerability in the CLI backend runner that allows attackers to inject malicious environment variables through workspace configuration. Attackers can craft malicious workspace configs to inject arbitrary environment variables intโ€ฆ

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 3:11 p.m.

6.1

CVSS4.0

CVE-2026-41383 - OpenClaw < 2026.4.2 - Arbitrary Remote Directory Deletion via Mis-scoped Mirror Mode Paths

OpenClaw before 2026.4.2 contains an arbitrary directory deletion vulnerability in mirror mode that allows attackers to delete remote directories by influencing remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values. Attackers can manipulate these OpenShell config paths to cause mirrorโ€ฆ

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 7:51 p.m.

2.3

CVSS4.0

CVE-2026-41382 - OpenClaw < 2026.3.31 - Discord Voice Ingress Authorization Bypass via Channel and Role Validation Gโ€ฆ

OpenClaw before 2026.3.31 contains an authorization bypass vulnerability in Discord voice ingress that allows attackers to bypass channel and member allowlist restrictions. Attackers can exploit stale-role validation gaps and improper channel name validation to gain unauthorized access to restricteโ€ฆ

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 1:33 p.m.

2.3

CVSS4.0

CVE-2026-41381 - OpenClaw < 2026.3.31 - Access Control Bypass in Discord Voice Manager via Channel Allowlist

OpenClaw before 2026.3.31 contains an access control bypass vulnerability in the Discord voice manager that allows attackers to bypass channel-level member access allowlist restrictions. Attackers can send Discord voice ingress requests before channel allowlist authorization is performed, gaining uโ€ฆ

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 2:30 p.m.

7

CVSS4.0

CVE-2026-41380 - OpenClaw < 2026.3.28 - Arbitrary Execution Allowlist via Wrapper Carrier Executables

OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows allow-always persistence to trust wrapper carrier executables instead of invoked targets. Attackers can exploit positional carrier executable routing through dispatch wrappers to establโ€ฆ

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 28, 2026, 6:09 p.m.

7.1

CVSS4.0

CVE-2026-41379 - OpenClaw < 2026.3.28 - Privilege Escalation via chat.send to Admin-Class Talk Voice Config

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Talk Voice configuration persistence. Attackers with operator.write privileges can exploit the chat.send endpoint to reach and modify sensitive voiceโ€ฆ

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 28, 2026, 6:09 p.m.

7.7

CVSS4.0

CVE-2026-41378 - OpenClaw < 2026.3.31 - Privilege Escalation to Remote Code Execution via Unrestricted node.event Agโ€ฆ

OpenClaw before 2026.3.31 contains a privilege escalation vulnerability allowing paired nodes with role=node to dispatch node.event agent requests with unrestricted gateway-side tool access. Attackers with trusted paired node credentials can escalate privileges by leveraging unrestricted agent.requโ€ฆ

๐Ÿ“… Published: April 28, 2026, 6:09 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 3:11 p.m.
Total resulsts: 349182
Page 217 of 34,919
ยซ previous page ยป next page
Filters