8.3

CVSS4.0

CVE-2026-32004 - OpenClaw < 2026.3.2 - Authentication Bypass via Encoded Path in /api/channels Route

OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass plugin route authentication checks by submitting…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 6:26 p.m.

7.5

CVSS4.0

CVE-2026-32003 - OpenClaw < 2026.2.22 - Remote Code Execution via SHELLOPTS/PS4 Environment Injection in system.run

OpenClaw versions prior to 2026.2.22 contain an environment variable injection vulnerability in the system.run function that allows attackers to bypass command allowlist restrictions via SHELLOPTS and PS4 environment variables. An attacker who can invoke system.run with request-scoped environment v…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 21, 2026, 3:23 a.m.

6

CVSS4.0

CVE-2026-32002 - OpenClaw < 2026.2.23 - Sandbox Boundary Bypass via Image Tool workspaceOnly Bypass

OpenClaw versions prior to 2026.2.23 contain a sandbox bypass vulnerability in the sandboxed image tool that fails to enforce tools.fs.workspaceOnly restrictions on mounted sandbox paths, allowing attackers to read out-of-workspace files. Attackers can load restricted mounted images and exfiltrate …

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 5:04 p.m.

5.3

CVSS4.0

CVE-2026-32001 - OpenClaw < 2026.2.22 - Node Role Device-Identity Bypass via WebSocket Authentication

OpenClaw versions prior to 2026.2.22 contain an authentication bypass vulnerability that allows clients authenticated with a shared gateway token to connect as role=node without device identity verification. Attackers can exploit this by claiming the node role during WebSocket handshake to inject u…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 8:09 p.m.

2.7

CVSS3.1

CVE-2026-33394 - Discourse leaks PM post edits to moderators

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the Post Edits admin report (/admin/reports/post_edits) leaked the first 40 characters of raw post content from private messages and secure categories to moderators who shouldn't have acces…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 20, 2026, 6:36 p.m.

4.3

CVSS3.1

CVE-2026-33393 - Discourse fixes loose hostname matching in spam host allowlist

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `allowed_spam_host_domains` check used `String#end_with?` without domain boundary validation, allowing domains like `attacker-example.com` to bypass spam protection when `example.com` w…

πŸ“… Published: March 19, 2026, 10:04 p.m. πŸ”„ Last Modified: March 20, 2026, 8:15 p.m.

6.5

CVSS3.1

CVE-2026-33355 - Discourse filters whisper posts from private-posts feed

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `/private-posts` endpoint did not apply post-type visibility filtering, allowing regular PM participants to see whisper posts in PM topics they had access to. Versions 2026.3.0-latest.1…

πŸ“… Published: March 19, 2026, 10:01 p.m. πŸ”„ Last Modified: March 20, 2026, 6:10 p.m.

2.4

CVSS4.0

CVE-2026-30873 - OpenWrt Project jsonpath: Memory leak when processing strings, labels, and regexp tokens

OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to both 24.10.6 and 25.12.1, the jp_get_token function, which performs lexical analysis by breaking input expressions into tokens, contains a memory leak vulnerability when extracting string literals, field la…

πŸ“… Published: March 19, 2026, 10:01 p.m. πŸ”„ Last Modified: March 21, 2026, 3:26 a.m.

5.4

CVSS3.1

CVE-2026-33410 - Discourse hardens chat DM channel creation and expansion

Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have two authorization issues in the chat direct message API. First, when creating a direct message channel or adding users to an existing one, the `target_groups` parameter was passed direc…

πŸ“… Published: March 19, 2026, 9:57 p.m. πŸ”„ Last Modified: March 20, 2026, 4:11 p.m.

9.5

CVSS4.0

CVE-2026-30872 - OpenWrt Project has a Stack-based Buffer Overflow vulnerability via IPv6 reverse DNS lookup

OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6 and 25.12.1, the mdns daemon has a Stack-based Buffer Overflow vulnerability in the match_ipv6_addresses function, triggered when processing PTR queries for IPv6 reverse DNS domains (.ip6.arpa) rece…

πŸ“… Published: March 19, 2026, 9:56 p.m. πŸ”„ Last Modified: March 20, 2026, 7:41 p.m.
Total resulsts: 339285
Page 54 of 33,929
Β« previous page Β» next page
Filters