2

CVSS4.0

CVE-2026-32018 - OpenClaw < 2026.2.19 - Race Condition in Sandbox Registry Write Operations

OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, …

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 2:59 p.m.

6

CVSS4.0

CVE-2026-32017 - OpenClaw < 2026.2.19 - Arbitrary File Write via Short-Option Bypass in exec Allowlist

OpenClaw versions prior to 2026.2.19 contain an allowlist bypass vulnerability in the exec safeBins policy that allows attackers to write arbitrary files using short-option payloads. Attackers can bypass argument validation by attaching short options like -o to whitelisted binaries, enabling unauth…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 6:12 p.m.

7.3

CVSS4.0

CVE-2026-32016 - OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS

OpenClaw versions prior to 2026.2.22 on macOS contain a path validation bypass vulnerability in the exec-approval allowlist mode that allows local attackers to execute unauthorized binaries by exploiting basename-only allowlist entries. Attackers can execute same-name local binaries ./echo without …

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 21, 2026, 3:20 a.m.

7.3

CVSS4.0

CVE-2026-32015 - OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Validation

OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a path hijacking vulnerability in tools.exec.safeBins that allows attackers to bypass allowlist checks by controlling process PATH resolution. Attackers who can influence the gateway process PATH or launch environment can execute trojan binarie…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 5:03 p.m.

8.6

CVSS4.0

CVE-2026-32014 - OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields

OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadat…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 8:12 p.m.

8.7

CVSS4.0

CVE-2026-32013 - OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway proc…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 6:10 p.m.

8.7

CVSS4.0

CVE-2026-32011 - OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing

OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can exploit this by sending slow or oversized request bodi…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 3:04 p.m.

5.8

CVSS4.0

CVE-2026-32010 - OpenClaw < 2026.2.22 - Allowlist Bypass via sort --compress-program Parameter

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safe-bin configuration when sort is manually added to tools.exec.safeBins. Attackers can invoke sort with the --compress-program flag to execute arbitrary external programs without operator approval in allowlist m…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 6:22 p.m.

7

CVSS4.0

CVE-2026-32009 - OpenClaw < 2026.2.24 - Binary Hijacking via Static Default Trusted Directories in safeBins

OpenClaw versions prior to 2026.2.24 contain a policy bypass vulnerability in the safeBins allowlist evaluation that trusts static default directories including writable package-manager paths like /opt/homebrew/bin and /usr/local/bin. An attacker with write access to these trusted directories can p…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 21, 2026, 3:21 a.m.

7.1

CVSS4.0

CVE-2026-32008 - OpenClaw < 2026.2.21 - Arbitrary Local File Read via Browser Navigation Guard

OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation vulnerability in the assertBrowserNavigationAllowed() function that allows authenticated users with browser-tool access to navigate to file:// URLs. Attackers can exploit this by accessing local files readable by the Ope…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 5:04 p.m.
Total resulsts: 339268
Page 51 of 33,927
Β« previous page Β» next page
Filters