7.5

CVSS3.1

CVE-2026-34209 - mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality

mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "<" instead of "<=" against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled โ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 3, 2026, 9:17 p.m.

6.9

CVSS4.0

CVE-2026-34504 - OpenClaw < 2026.3.28 - Server-Side Request Forgery via Unguarded Image Download in fal Provider

OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability in the fal provider image-generation-provider.ts component that allows attackers to fetch internal URLs. A malicious or compromised fal relay can exploit unguarded image download fetches to expose internal service metadaโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 12:20 p.m.

8.6

CVSS4.0

CVE-2026-34503 - OpenClaw < 2026.3.28 - Incomplete WebSocket Session Termination on Device Removal and Token Revocatโ€ฆ

OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when devices are removed or tokens are revoked. Attackers with revoked credentials can maintain unauthorized access through existing live sessions until forced reconnection.

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 3:12 p.m.

7.1

CVSS4.0

CVE-2026-33581 - OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters

OpenClaw before 2026.3.24 contains a sandbox bypass vulnerability in the message tool that allows attackers to read arbitrary local files by using mediaUrl and fileUrl alias parameters that bypass localRoots validation. Remote attackers can exploit this by routing file requests through unvalidated โ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 1, 2026, 7:01 p.m.

6.3

CVSS4.0

CVE-2026-33580 - OpenClaw < 2026.3.28 - Brute Force Attack via Missing Rate Limiting on Webhook Shared Secret Authenโ€ฆ

OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the Nextcloud Talk webhook authentication that allows attackers to brute-force weak shared secrets. Attackers who can reach the webhook endpoint can exploit this to forge inbound webhook events by repeatedly attempting authโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 1, 2026, 6:54 p.m.

9.4

CVSS4.0

CVE-2026-33579 - OpenClaw < 2026.3.28 - Privilege Escalation via Missing Caller Scope Validation in Device Pair Apprโ€ฆ

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes incโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 8:08 a.m.

5.3

CVSS4.0

CVE-2026-33578 - OpenClaw < 2026.3.28 - Sender Policy Allowlist Bypass via Policy Downgrade in Google Chat and Zalouโ€ฆ

OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to bypass sender restrictions and interact with bots desโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 1:08 p.m.

8.6

CVSS4.0

CVE-2026-33577 - OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve

OpenClaw before 2026.3.28 contains an insufficient scope validation vulnerability in the node pairing approval path that allows low-privilege operators to approve nodes with broader scopes. Attackers can exploit missing callerScopes validation in node-pairing.ts to extend privileges onto paired nodโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 12:57 p.m.

6.9

CVSS4.0

CVE-2026-33576 - OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel

OpenClaw before 2026.3.28 downloads and stores inbound media from Zalo channels before validating sender authorization. Unauthorized senders can force network fetches and disk writes to the media store by sending messages that are subsequently rejected.

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 3:11 p.m.

6

CVSS4.0

CVE-2026-34210 - mppx has Stripe charge credential replay via missing idempotency check

mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the stripe/charge payment method did not check Stripe's Idempotent-Replayed response header when creating PaymentIntents. An attacker could replay a valid credential containing the same spt token against a new chโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 3, 2026, 9:17 p.m.
Total resulsts: 349182
Page 779 of 34,919
ยซ previous page ยป next page
Filters