2

CVSS4.0

CVE-2026-41330 - OpenClaw < 2026.3.31 - Environment Variable Override via Host Exec Policy

OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, Dโ€ฆ

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 3:45 p.m.

9

CVSS4.0

CVE-2026-41329 - OpenClaw < 2026.3.31 - Sandbox Bypass via Heartbeat Context Inheritance and senderIsOwner Escalation

OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilegeโ€ฆ

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 6 a.m.

8.7

CVSS4.0

CVE-2026-41303 - OpenClaw < 2026.3.28 - Authorization Bypass in Discord Text Approval Commands

OpenClaw before 2026.3.28 contains an authorization bypass vulnerability in Discord text approval commands that allows non-approvers to resolve pending exec approvals. Attackers can send Discord text commands to bypass the channels.discord.execApprovals.approvers allowlist and approve pending host โ€ฆ

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 3:45 p.m.

4.8

CVSS4.0

CVE-2026-41302 - OpenClaw < 2026.3.31 - Server-Side Request Forgery via Unguarded fetch() in Marketplace Plugin Downโ€ฆ

OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows remote attackers to make arbitrary network requests. Attackers can exploit unguarded fetch() calls to access internal resources or interact with external serviโ€ฆ

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 20, 2026, 11:08 p.m.

6.9

CVSS4.0

CVE-2026-41301 - OpenClaw 2026.3.22 < 2026.3.31 - Forged Nostr DM Pairing State Creation via Signature Verification โ€ฆ

OpenClaw versions 2026.3.22 before 2026.3.31 contain a signature verification bypass vulnerability in the Nostr DM ingress path that allows pairing challenges to be issued before event signature validation. An unauthenticated remote attacker can send forged direct messages to create pending pairingโ€ฆ

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 3:45 p.m.

6.9

CVSS4.0

CVE-2026-41300 - OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Preservation in Remote Onboarding

OpenClaw before 2026.3.31 contains a trust-decline vulnerability that preserves attacker-discovered endpoints in remote onboarding flows. Attackers can route gateway credentials to malicious endpoints by having their discovered URL survive the trust decline process into manual prompts requiring opeโ€ฆ

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 3:45 p.m.

7.1

CVSS4.0

CVE-2026-41299 - OpenClaw < 2026.3.28 - Client Identity Spoofing in chat.send Gateway Provenance Guard

OpenClaw before 2026.3.28 contains an authorization bypass vulnerability in the chat.send gateway method where ACP-only provenance fields are gated by self-declared client metadata from WebSocket handshake rather than verified authorization state. Authenticated operator clients can spoof ACP identiโ€ฆ

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 3:45 p.m.

5.3

CVSS4.0

CVE-2026-41298 - OpenClaw < 2026.4.2 - Authorization Bypass in Session Termination Endpoint

OpenClaw before 2026.4.2 fails to enforce write scopes on the POST /sessions/:sessionKey/kill endpoint in identity-bearing HTTP modes. Read-scoped callers can terminate running subagent sessions by sending requests to this endpoint, bypassing authorization controls.

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 5:34 p.m.

4.8

CVSS4.0

CVE-2026-41297 - OpenClaw < 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect

OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive dowโ€ฆ

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 3:45 p.m.

8.8

CVSS4.0

CVE-2026-41296 - OpenClaw < 2026.3.31 - Sandbox Escape via TOCTOU Race in Remote FS Bridge readFile

OpenClaw before 2026.3.31 contains a time-of-check-time-of-use race condition in the remote filesystem bridge readFile function that allows sandbox escape. Attackers can exploit the separate path validation and file read operations to bypass sandbox restrictions and read arbitrary files.

๐Ÿ“… Published: April 20, 2026, 11:08 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 3:45 p.m.
Total resulsts: 346087
Page 73 of 34,609
ยซ previous page ยป next page
Filters