8.7

CVSS4.0

CVE-2026-35638 - OpenClaw < 2026.3.22 - Privilege Escalation via Self-Declared Scopes in Trusted-Proxy Control UI

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the Control UI that allows unauthenticated sessions to retain self-declared privileged scopes without device identity verification. Attackers can exploit the device-less allow path in the trusted-proxy mechanism to maintain …

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 9, 2026, 9:27 p.m.

6.9

CVSS4.0

CVE-2026-35637 - OpenClaw < 2026.3.22 - Premature Cite Expansion Before Authorization in Channel and DM

OpenClaw before 2026.3.22 performs cite expansion before completing channel and DM authorization checks, allowing cite work and content handling prior to final auth decisions. Attackers can exploit this timing vulnerability to access or manipulate content before proper authorization validation occu…

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 10, 2026, 5:13 p.m.

7.1

CVSS4.0

CVE-2026-35636 - OpenClaw 2026.3.11 < 2026.3.25 - Session Isolation Bypass via sessionId Resolution

OpenClaw versions 2026.3.11 through 2026.3.24 contain a session isolation bypass vulnerability where session_status resolves sessionId to canonical session keys before enforcing visibility checks. Sandboxed child sessions can exploit this to access parent or sibling sessions that should be blocked …

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 9, 2026, 9:27 p.m.

6.3

CVSS4.0

CVE-2026-35635 - OpenClaw < 2026.3.22 - Webhook Path Route Replacement Vulnerability in Synology Chat

OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in the Synology Chat extension that allows attackers to collapse multi-account configurations onto shared webhook paths. Attackers can exploit inherited or duplicate webhook paths to bypass per-account DM access contr…

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 10, 2026, 9:28 a.m.

5.1

CVSS4.0

CVE-2026-35634 - OpenClaw < 2026.3.23 - Authentication Bypass via Local-Direct Requests in Canvas Gateway

OpenClaw before 2026.3.23 contains an authentication bypass vulnerability in the Canvas gateway where authorizeCanvasRequest() unconditionally allows local-direct requests without validating bearer tokens or canvas capabilities. Attackers can send unauthenticated loopback HTTP and WebSocket request…

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 10, 2026, 12:30 p.m.

6.9

CVSS4.0

CVE-2026-35633 - OpenClaw < 2026.3.22 - Unbounded Memory Allocation via Remote Media Error Responses

OpenClaw before 2026.3.22 contains an unbounded memory allocation vulnerability in remote media HTTP error handling that allows attackers to trigger excessive memory consumption. Attackers can send crafted HTTP error responses with large bodies to remote media endpoints, causing the application to …

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 10, 2026, 9:28 a.m.

6.9

CVSS4.0

CVE-2026-35632 - OpenClaw < 2026.2.22 - Symlink Traversal via IDENTITY.md appendFile in agents.create/update

OpenClaw through 2026.2.22 contains a symlink traversal vulnerability in agents.create and agents.update handlers that use fs.appendFile on IDENTITY.md without symlink containment checks. Attackers with workspace access can plant symlinks to append attacker-controlled content to arbitrary files, en…

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 9, 2026, 9:27 p.m.

7.1

CVSS4.0

CVE-2026-35631 - OpenClaw < 2026.3.22 - Missing Authorization Enforcement in Internal ACP Chat Commands

OpenClaw before 2026.3.22 fails to enforce operator.admin scope on mutating internal ACP chat commands, allowing unauthorized modifications. Attackers without admin privileges can execute mutating control-plane actions by directly invoking affected ACP commands to bypass authorization gates.

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 10, 2026, 5:14 p.m.

5.3

CVSS4.0

CVE-2026-35629 - OpenClaw < 2026.3.25 - Server-Side Request Forgery via Unguarded Configured Base URLs in Channel Ex…

OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability in multiple channel extensions that fail to properly guard configured base URLs against SSRF attacks. Attackers can exploit unprotected fetch() calls against configured endpoints to rebind requests to blocked internal de…

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 10, 2026, 3:55 p.m.

6.3

CVSS4.0

CVE-2026-35628 - OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Telegram Webhook Rate Limiting

OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in Telegram webhook authentication that allows attackers to brute-force weak webhook secrets. The vulnerability enables repeated authentication guesses without throttling, permitting attackers to systematically guess webhook s…

πŸ“… Published: April 9, 2026, 9:27 p.m. πŸ”„ Last Modified: April 9, 2026, 9:27 p.m.
Total resulsts: 343921
Page 31 of 34,393
Β« previous page Β» next page
Filters