8.6

CVSS4.0

CVE-2026-32014 - OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields

OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadatโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 23, 2026, 7:09 p.m.

8.7

CVSS4.0

CVE-2026-32013 - OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway procโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 23, 2026, 6:29 p.m.

8.7

CVSS4.0

CVE-2026-32011 - OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing

OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can exploit this by sending slow or oversized request bodiโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 23, 2026, 6:29 p.m.

5.8

CVSS4.0

CVE-2026-32010 - OpenClaw < 2026.2.22 - Allowlist Bypass via sort --compress-program Parameter

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safe-bin configuration when sort is manually added to tools.exec.safeBins. Attackers can invoke sort with the --compress-program flag to execute arbitrary external programs without operator approval in allowlist mโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 23, 2026, 6:29 p.m.

7

CVSS4.0

CVE-2026-32009 - OpenClaw < 2026.2.24 - Binary Hijacking via Static Default Trusted Directories in safeBins

OpenClaw versions prior to 2026.2.24 contain a policy bypass vulnerability in the safeBins allowlist evaluation that trusts static default directories including writable package-manager paths like /opt/homebrew/bin and /usr/local/bin. An attacker with write access to these trusted directories can pโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 23, 2026, 6:33 p.m.

7.1

CVSS4.0

CVE-2026-32008 - OpenClaw < 2026.2.21 - Arbitrary Local File Read via Browser Navigation Guard

OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation vulnerability in the assertBrowserNavigationAllowed() function that allows authenticated users with browser-tool access to navigate to file:// URLs. Attackers can exploit this by accessing local files readable by the Opeโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 23, 2026, 5:34 p.m.

7.6

CVSS4.0

CVE-2026-32007 - OpenClaw < 2026.2.23 - Sandbox Bypass in apply_patch Tool via Workspace-Only Check Bypass

OpenClaw versions prior to 2026.2.23 contain a path traversal vulnerability in the experimental apply_patch tool that allows attackers with sandbox access to modify files outside the workspace directory by exploiting inconsistent enforcement of workspace-only checks on mounted paths. Attackers can โ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 24, 2026, 9:22 p.m.

2.3

CVSS4.0

CVE-2026-32006 - OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Fallback in Group Allowlist

OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly treated as group allowlist identities when dmPolicy=pairing and groupPolicy=allowlist. Remote attackers can send messages and reactions as DM-paired identities withouโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 24, 2026, 9:22 p.m.

7.6

CVSS4.0

CVE-2026-32005 - OpenClaw < 2026.2.25 - Authorization Bypass in Interactive Callbacks via Sender Check Skip

OpenClaw versions prior to 2026.2.25 fail to enforce sender authorization checks for interactive callbacks including block_action, view_submission, and view_closed in shared workspace deployments. Unauthorized workspace members can bypass allowFrom restrictions and channel user allowlists to enqueuโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 24, 2026, 9:22 p.m.

8.3

CVSS4.0

CVE-2026-32004 - OpenClaw < 2026.3.2 - Authentication Bypass via Encoded Path in /api/channels Route

OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass plugin route authentication checks by submittingโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 23, 2026, 7:12 p.m.
Total resulsts: 348492
Page 970 of 34,850
ยซ previous page ยป next page
Filters