6

CVSS4.0

CVE-2026-32057 - OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter

OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui c…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

7.7

CVSS4.0

CVE-2026-32056 - OpenClaw < 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in sy…

OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrar…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:44 p.m.

7.2

CVSS4.0

CVE-2026-32055 - OpenClaw < 2026.2.26 - Workspace Path Boundary Bypass via Non-existent Symlink

OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in workspace boundary validation that allows attackers to write files outside the workspace through in-workspace symlinks pointing to non-existent out-of-root targets. The vulnerability exists because the boundary check imp…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:44 p.m.

5.9

CVSS4.0

CVE-2026-32054 - OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in browser trace and download output path handling that allows local attackers to escape the managed temp root directory. An attacker with local access can create symlinks to route file writes outside the intended temp d…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:44 p.m.

6.9

CVSS4.0

CVE-2026-32053 - OpenClaw < 2026.2.23 - Twilio Webhook Replay Bypass via Randomized Event ID Normalization

OpenClaw versions prior to 2026.2.23 contain a vulnerability in Twilio webhook event deduplication where normalized event IDs are randomized per parse, allowing replay events to bypass manager dedupe checks. Attackers can replay Twilio webhook events to trigger duplicate or stale call-state transit…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:44 p.m.

5.8

CVSS4.0

CVE-2026-32052 - OpenClaw < 2026.2.24 - Hidden Command Execution via Shell-Wrapper Positional argv Carriers

OpenClaw versions prior to 2026.2.24 contain a command injection vulnerability in the system.run shell-wrapper that allows attackers to execute hidden commands by injecting positional argv carriers after inline shell payloads. Attackers can craft misleading approval text while executing arbitrary c…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:44 p.m.

8.7

CVSS4.0

CVE-2026-32051 - OpenClaw < 2026.3.1 - Authorization Bypass in Agent Runs via Owner-Only Tool Access

OpenClaw versions prior to 2026.3.1 contain an authorization mismatch vulnerability that allows authenticated callers with operator.write scope to invoke owner-only tool surfaces including gateway and cron through agent runs in scoped-token deployments. Attackers with write-scope access can perform…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:33 p.m.

6.3

CVSS4.0

CVE-2026-32050 - OpenClaw < 2026.2.25 - Unauthorized Reaction Status Event Enqueue via Access Check Bypass

OpenClaw versions prior to 2026.2.25 contain an access control vulnerability in signal reaction notification handling that allows unauthorized senders to enqueue status events before authorization checks are applied. Attackers can exploit the reaction-only event path in event-handler.ts to queue si…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:33 p.m.

8.7

CVSS4.0

CVE-2026-32049 - OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass

OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated memory usage and potential process instability.

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:33 p.m.

7.7

CVSS4.0

CVE-2026-32048 - OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn

OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit this to spawn child runtimes with sandbox.mode set t…

πŸ“… Published: March 21, 2026, 12:42 a.m. πŸ”„ Last Modified: March 25, 2026, 2:33 p.m.
Total resulsts: 349182
Page 1003 of 34,919
Β« previous page Β» next page
Filters