7.1

CVSS4.0

CVE-2026-31992 - OpenClaw < 2026.2.23 - Allowlist Exec-Guard Bypass via env -S

OpenClaw versions prior to 2026.2.23 contain an allowlist bypass vulnerability in system.run guardrails that allows authenticated operators to execute unintended commands. When /usr/bin/env is allowlisted, attackers can use env -S to bypass policy analysis and execute shell wrapper payloads at runt…

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 2:10 p.m.

2

CVSS4.0

CVE-2026-31991 - OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Leakage in Signal Group Allowlist

OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where Signal group allowlist policy incorrectly accepts sender identities from DM pairing-store approvals. Attackers can exploit this boundary weakness by obtaining DM pairing approval to bypass group allowlist check…

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 2:10 p.m.

6.9

CVSS4.0

CVE-2026-31990 - OpenClaw < 2026.3.2 - Symlink Traversal in stageSandboxMedia Destination

OpenClaw versions prior to 2026.3.2 contain a vulnerability in the stageSandboxMedia function in which it fails to validate destination symlinks during media staging, allowing writes to follow symlinks outside the sandbox workspace. Attackers can exploit this by placing symlinks in the media/inboun…

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 2:10 p.m.

5.3

CVSS4.0

CVE-2026-31989 - OpenClaw < 2026.3.1 - Server-Side Request Forgery via web_search Citation Redirect

OpenClaw versions prior to 2026.3.1 contain a server-side request forgery vulnerability in web_search citation redirect resolution that uses a private-network-allowing SSRF policy. An attacker who can influence citation redirect targets can trigger internal-network requests from the OpenClaw host t…

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 2:10 p.m.

5.4

CVSS4.0

CVE-2026-29608 - OpenClaw 2026.3.1 < 2026.3.2 - Approval Integrity Bypass via system.run argv Rewriting

OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run node-host execution where argv rewriting changes command semantics. Attackers can place malicious local scripts in the working directory to execute unintended code despite operator approval of different command text.

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 2:10 p.m.

7.1

CVSS4.0

CVE-2026-29607 - OpenClaw < 2026.2.22 - Authorization Bypass via allow-always Wrapper Persistence

OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in allow-always wrapper persistence that allows attackers to bypass approval checks by persisting wrapper-level allowlist entries instead of validating inner executable intent. Remote attackers can approve benign wra…

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

8.7

CVSS4.0

CVE-2026-28461 - OpenClaw < 2026.3.1 - Unbounded Memory Growth in Zalo Webhook via Query String Key Churn

OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger in-memory key accumulation by varying query strings. Remote attackers can exploit this by sending repeated requests with different query…

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 11:51 a.m.

6

CVSS4.0

CVE-2026-28460 - OpenClaw < 2026.2.22 - Allowlist Bypass via Shell Line-Continuation Command Substitution in system.…

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run that allows attackers to execute non-allowlisted commands by splitting command substitution using shell line-continuation characters. Attackers can bypass security analysis by injecting $\\ followed by a ne…

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

6.3

CVSS4.0

CVE-2026-28449 - OpenClaw < 2026.2.25 - Webhook Replay Attack via Missing Durable Replay Suppression

OpenClaw versions prior to 2026.2.25 lack durable replay state for Nextcloud Talk webhook events, allowing valid signed webhook requests to be replayed without suppression. Attackers can capture and replay previously valid signed webhook requests to trigger duplicate inbound message processing and …

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

5.8

CVSS4.0

CVE-2026-27670 - OpenClaw < 2026.3.2 - Arbitrary File Write via ZIP Extraction Parent Symlink Race Condition

OpenClaw versions prior to 2026.3.2 contain a race condition vulnerability in ZIP extraction that allows local attackers to write files outside the intended destination directory. Attackers can exploit a time-of-check-time-of-use race between path validation and file write operations by rebinding p…

πŸ“… Published: March 19, 2026, 1 a.m. πŸ”„ Last Modified: March 25, 2026, 11:51 a.m.
Total resulsts: 348396
Page 976 of 34,840
Β« previous page Β» next page
Filters