7.1

CVSS4.0

CVE-2026-32008 - OpenClaw < 2026.2.21 - Arbitrary Local File Read via Browser Navigation Guard

OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation vulnerability in the assertBrowserNavigationAllowed() function that allows authenticated users with browser-tool access to navigate to file:// URLs. Attackers can exploit this by accessing local files readable by the Ope…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 5:04 p.m.

7.6

CVSS4.0

CVE-2026-32007 - OpenClaw < 2026.2.23 - Sandbox Bypass in apply_patch Tool via Workspace-Only Check Bypass

OpenClaw versions prior to 2026.2.23 contain a path traversal vulnerability in the experimental apply_patch tool that allows attackers with sandbox access to modify files outside the workspace directory by exploiting inconsistent enforcement of workspace-only checks on mounted paths. Attackers can …

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 8:13 p.m.

2.3

CVSS4.0

CVE-2026-32006 - OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Fallback in Group Allowlist

OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly treated as group allowlist identities when dmPolicy=pairing and groupPolicy=allowlist. Remote attackers can send messages and reactions as DM-paired identities withou…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 6:02 p.m.

7.6

CVSS4.0

CVE-2026-32005 - OpenClaw < 2026.2.25 - Authorization Bypass in Interactive Callbacks via Sender Check Skip

OpenClaw versions prior to 2026.2.25 fail to enforce sender authorization checks for interactive callbacks including block_action, view_submission, and view_closed in shared workspace deployments. Unauthorized workspace members can bypass allowFrom restrictions and channel user allowlists to enqueu…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 3:13 p.m.

8.3

CVSS4.0

CVE-2026-32004 - OpenClaw < 2026.3.2 - Authentication Bypass via Encoded Path in /api/channels Route

OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass plugin route authentication checks by submitting…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 6:26 p.m.

7.5

CVSS4.0

CVE-2026-32003 - OpenClaw < 2026.2.22 - Remote Code Execution via SHELLOPTS/PS4 Environment Injection in system.run

OpenClaw versions prior to 2026.2.22 contain an environment variable injection vulnerability in the system.run function that allows attackers to bypass command allowlist restrictions via SHELLOPTS and PS4 environment variables. An attacker who can invoke system.run with request-scoped environment v…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 21, 2026, 3:23 a.m.

6

CVSS4.0

CVE-2026-32002 - OpenClaw < 2026.2.23 - Sandbox Boundary Bypass via Image Tool workspaceOnly Bypass

OpenClaw versions prior to 2026.2.23 contain a sandbox bypass vulnerability in the sandboxed image tool that fails to enforce tools.fs.workspaceOnly restrictions on mounted sandbox paths, allowing attackers to read out-of-workspace files. Attackers can load restricted mounted images and exfiltrate …

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 5:04 p.m.

5.3

CVSS4.0

CVE-2026-32001 - OpenClaw < 2026.2.22 - Node Role Device-Identity Bypass via WebSocket Authentication

OpenClaw versions prior to 2026.2.22 contain an authentication bypass vulnerability that allows clients authenticated with a shared gateway token to connect as role=node without device identity verification. Attackers can exploit this by claiming the node role during WebSocket handshake to inject u…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 8:09 p.m.

2.7

CVSS3.1

CVE-2026-33394 - Discourse leaks PM post edits to moderators

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the Post Edits admin report (/admin/reports/post_edits) leaked the first 40 characters of raw post content from private messages and secure categories to moderators who shouldn't have acces…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 6:36 p.m.

4.3

CVSS3.1

CVE-2026-33393 - Discourse fixes loose hostname matching in spam host allowlist

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `allowed_spam_host_domains` check used `String#end_with?` without domain boundary validation, allowing domains like `attacker-example.com` to bypass spam protection when `example.com` w…

πŸ“… Published: March 19, 2026, 10:04 p.m. πŸ”„ Last Modified: March 20, 2026, 8:15 p.m.
Total resulsts: 339279
Page 53 of 33,928
Β« previous page Β» next page
Filters