4.8

CVSS4.0

CVE-2026-32046 - OpenClaw < 2026.2.21 - OS-level Sandbox Bypass via --no-sandbox Flag

OpenClaw versions prior to 2026.2.21 contain an improper sandbox configuration vulnerability that allows attackers to execute arbitrary code by exploiting renderer-side vulnerabilities without requiring a sandbox escape. Attackers can leverage the disabled OS-level sandbox protections in the Chromi…

📅 Published: March 21, 2026, 12:42 a.m. 🔄 Last Modified: March 25, 2026, 2:33 p.m.

8.2

CVSS4.0

CVE-2026-32045 - OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth

OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication cr…

📅 Published: March 21, 2026, 12:42 a.m. 🔄 Last Modified: March 25, 2026, 2:33 p.m.

6.7

CVSS4.0

CVE-2026-32044 - OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation

OpenClaw versions prior to 2026.3.2 contain an archive extraction vulnerability in the tar.bz2 installer path that bypasses safety checks enforced on other archive formats. Attackers can craft malicious tar.bz2 skill archives to bypass special-entry blocking and extracted-size guardrails, causing l…

📅 Published: March 21, 2026, 12:42 a.m. 🔄 Last Modified: March 25, 2026, 2:33 p.m.

5.9

CVSS4.0

CVE-2026-32043 - OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Parameter

OpenClaw versions prior to 2026.2.25 contain a time-of-check-time-of-use vulnerability in approval-bound system.run execution where the cwd parameter is validated at approval time but resolved at execution time. Attackers can retarget a symlinked cwd between approval and execution to bypass command…

📅 Published: March 21, 2026, 12:42 a.m. 🔄 Last Modified: March 25, 2026, 2:33 p.m.

8.7

CVSS4.0

CVE-2026-32042 - OpenClaw < 2026.2.25 - Privilege Escalation via Unpaired Device Identity in Shared Gateway Authenti…

OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers with valid shared gateway authentication can present a…

📅 Published: March 21, 2026, 12:42 a.m. 🔄 Last Modified: March 25, 2026, 2:33 p.m.

4.3

CVSS3.1

CVE-2026-33238 - AVideo has a Path Traversal in listFiles.json.php that Enables Server Filesystem Enumeration

WWBN AVideo is an open source video platform. Prior to version 26.0, the `listFiles.json.php` endpoint accepts a `path` POST parameter and passes it directly to `glob()` without restricting the path to an allowed base directory. An authenticated uploader can traverse the entire server filesystem by…

📅 Published: March 20, 2026, 11:31 p.m. 🔄 Last Modified: April 13, 2026, 6:16 p.m.

5.5

CVSS3.1

CVE-2026-33237 - AVideo has SSRF in Scheduler Plugin via callbackURL Missing `isSSRFSafeURL()` Validation

WWBN AVideo is an open source video platform. Prior to version 26.0, the Scheduler plugin's `run()` function in `plugin/Scheduler/Scheduler.php` calls `url_get_contents()` with an admin-configurable `callbackURL` that is validated only by `isValidURL()` (URL format check). Unlike other AVideo endpo…

📅 Published: March 20, 2026, 11:30 p.m. 🔄 Last Modified: April 13, 2026, 6:16 p.m.

6.4

CVSS3.1

CVE-2026-2430 - Autoptimize <= 3.1.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Lazy-loaded Im…

The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the lazy-loading image processing in all versions up to, and including, 3.1.14. This is due to the use of an overly permissive regular expression in the `add_lazyload` function that replaces all occurrences of `\s…

📅 Published: March 20, 2026, 11:25 p.m. 🔄 Last Modified: April 22, 2026, 9:32 p.m.

4.9

CVSS3.1

CVE-2026-3474 - EmailKit <= 1.6.3 - Authenticated (Administrator+) Path Traversal via 'emailkit-editor-template' RE…

The EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 1.6.3. This is due to the action() function in the TemplateData class passing user-supplied input from the 'emailkit-editor-templat…

📅 Published: March 20, 2026, 11:25 p.m. 🔄 Last Modified: April 22, 2026, 9:32 p.m.

6.4

CVSS3.1

CVE-2026-3350 - Image Alt Text Manager <= 1.8.2 - Authenticated (Author+) Stored Cross-Site Scripting via Post Title

The Image Alt Text Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post title in all versions up to, and including, 1.8.2. This is due to insufficient input sanitization and output escaping when dynamically generating image alt and title attributes using a DOM pars…

📅 Published: March 20, 2026, 11:25 p.m. 🔄 Last Modified: April 22, 2026, 9:32 p.m.
Total resulsts: 349182
Page 1004 of 34,919
« previous page » next page
Filters