6.9

CVSS4.0

CVE-2026-35626 - OpenClaw < 2026.3.22 - Unauthenticated Resource Exhaustion via Voice Call Webhook

OpenClaw before 2026.3.22 contains an unauthenticated resource exhaustion vulnerability in voice call webhook handling that buffers request bodies before provider signature checks. Attackers can send large or malicious webhook requests to exhaust server resources without authentication by bypassing…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 10, 2026, 9:28 a.m.

8.5

CVSS4.0

CVE-2026-35625 - OpenClaw < 2026.3.25 - Privilege Escalation via Silent Local Shared-Auth Reconnect

OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where silent local shared-auth reconnects auto-approve scope-upgrade requests, widening paired device permissions from operator.read to operator.admin. Attackers can exploit this by triggering local reconnection to silently esc…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 9, 2026, 9:26 p.m.

2.3

CVSS4.0

CVE-2026-35624 - OpenClaw < 2026.3.22 - Policy Confusion via Room Name Collision in Nextcloud Talk

OpenClaw before 2026.3.22 contains a policy confusion vulnerability in room authorization that matches colliding room names instead of stable room tokens. Attackers can exploit similarly named rooms to bypass allowlist policies and gain unauthorized access to protected Nextcloud Talk rooms.

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 10, 2026, 5:16 p.m.

6.3

CVSS4.0

CVE-2026-35623 - OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Webhook Password Rate Limiting

OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in webhook authentication that allows attackers to brute-force weak webhook passwords without throttling. Remote attackers can repeatedly submit incorrect password guesses to the webhook endpoint to compromise authentication a…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 10, 2026, 3:55 p.m.

6

CVSS4.0

CVE-2026-35622 - OpenClaw < 2026.3.22 - Improper Authentication Verification in Google Chat Webhook

OpenClaw before 2026.3.22 contains an improper authentication verification vulnerability in Google Chat app-url webhook handling that accepts add-on principals outside intended deployment bindings. Attackers can bypass webhook authentication by providing non-deployment add-on principals to execute …

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 9, 2026, 9:26 p.m.

8.3

CVSS4.0

CVE-2026-35618 - OpenClaw < 2026.3.23 - Replay Identity Drift via Query-Only Variants in Plivo V2 Verification

OpenClaw before 2026.3.23 contains a replay identity vulnerability in Plivo V2 signature verification that allows attackers to bypass replay protection by modifying query parameters. The verification path derives replay keys from the full URL including query strings instead of the canonicalized bas…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 10, 2026, 12:33 p.m.

2.3

CVSS4.0

CVE-2026-35617 - OpenClaw < 2026.3.25 - Authorization Bypass via Group Policy Rebinding with Mutable Space displayNa…

OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Google Chat group policy enforcement that relies on mutable space display names. Attackers can rebind group policies by changing or colliding space display names to gain unauthorized access to protected resources.

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 9, 2026, 9:26 p.m.

7.2

CVSS4.0

CVE-2026-34512 - OpenClaw < 2026.3.25 - Improper Access Control in /sessions/:sessionKey/kill Endpoint

OpenClaw before 2026.3.25 contains an improper access control vulnerability in the HTTP /sessions/:sessionKey/kill route that allows any bearer-authenticated user to invoke admin-level session termination functions without proper scope validation. Attackers can exploit this by sending authenticated…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 9, 2026, 9:26 p.m.

5.3

CVSS3.1

CVE-2026-40152 - PraisonAIAgents has a Path Traversal via Unvalidated Glob Pattern in list_files Bypasses Workspace …

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without any validation. Since Python's Path.glob() support…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 10, 2026, 9:28 a.m.

7.1

CVSS4.0

CVE-2026-21919 - Junos OS and Junos OS Evolved: A high frequency of connecting and disconnecting NETCONF sessions ca…

An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker with low privileges to cause a complete Denial-of-Service (DoS) of the management plane. When NETCONF sessions are quickly established and dis…

📅 Published: April 9, 2026, 9:26 p.m. 🔄 Last Modified: April 9, 2026, 9:26 p.m.
Total resulsts: 343980
Page 38 of 34,398
« previous page » next page
Filters