6

CVSS4.0

CVE-2026-32033 - OpenClaw < 2026.2.24 - Path Traversal via @-prefixed Absolute Paths in Workspace Boundary Validation

OpenClaw versions prior to 2026.2.24 contain a path traversal vulnerability where @-prefixed absolute paths bypass workspace-only file-system boundary validation due to canonicalization mismatch. Attackers can exploit this by crafting @-prefixed paths like @/etc/passwd to read files outside the int…

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

7.3

CVSS4.0

CVE-2026-32032 - OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variable

OpenClaw versions prior to 2026.2.22 contain an arbitrary shell execution vulnerability in shell environment fallback that trusts the unvalidated SHELL path from the host environment. An attacker with local environment access can inject a malicious SHELL variable to execute arbitrary commands with …

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

6.3

CVSS4.0

CVE-2026-32031 - OpenClaw < 2026.2.26 - Authentication Bypass via Path Canonicalization Mismatch in /api/channels Ga…

OpenClaw versions prior to 2026.2.26 server-http contains an authentication bypass vulnerability in gateway authentication for plugin channel endpoints due to path canonicalization mismatch between the gateway guard and plugin handler routing. Attackers can bypass authentication by sending requests…

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 23, 2026, 3:05 p.m.

8.2

CVSS4.0

CVE-2026-32030 - OpenClaw < 2026.2.19 - Sensitive File Disclosure via stageSandboxMedia Path Traversal

OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the stageSandboxMedia function that accepts arbitrary absolute paths when iMessage remote attachment fetching is enabled. An attacker who can tamper with attachment path metadata can disclose files readable by the OpenCl…

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

6.3

CVSS4.0

CVE-2026-32029 - OpenClaw < 2026.2.21 - Client IP Spoofing via X-Forwarded-For Header Parsing

OpenClaw versions prior to 2026.2.21 improperly parse the left-most X-Forwarded-For header value when requests originate from configured trusted proxies, allowing attackers to spoof client IP addresses. In proxy chains that append or preserve header values, attackers can inject malicious header con…

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

6.3

CVSS4.0

CVE-2026-32028 - OpenClaw < 2026.2.25 - Missing Authorization Check in Discord DM Reaction Ingress

OpenClaw versions prior to 2026.2.25 fail to enforce dmPolicy and allowFrom authorization checks on Discord direct-message reaction notifications, allowing non-allowlisted users to enqueue reaction-derived system events. Attackers can exploit this inconsistency by reacting to bot-authored DM messag…

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 25, 2026, 3:16 p.m.

7.1

CVSS4.0

CVE-2026-32027 - OpenClaw < 2026.2.26 - Improper Authorization via DM Pairing Store Identity Inheritance in Group Al…

OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly eligible for group allowlist authorization checks. Attackers can exploit this cross-context authorization flaw by using a sender approved via DM pairing to satisfy gr…

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 27, 2026, 9:21 a.m.

7.1

CVSS4.0

CVE-2026-32026 - OpenClaw < 2026.2.24 - Arbitrary File Read via Improper Temporary Path Validation in Sandbox

OpenClaw versions prior to 2026.2.24 contain an improper path validation vulnerability in sandbox media handling that allows absolute paths under the host temporary directory outside the active sandbox root. Attackers can exploit this by providing malicious media references to read and exfiltrate a…

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 23, 2026, 5:13 p.m.

7.5

CVSS4.0

CVE-2026-32025 - OpenClaw < 2026.2.25 - Password Brute-Force via Browser-Origin WebSocket Authentication Bypass

OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in browser-origin WebSocket clients that allows attackers to bypass origin checks and auth throttling on loopback deployments. An attacker can trick a user into opening a malicious webpage and perform password brute-force …

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 23, 2026, 5:12 p.m.

6.8

CVSS4.0

CVE-2026-32024 - OpenClaw < 2026.2.22 - Symlink Traversal in Avatar Handling

OpenClaw versions prior to 2026.2.22 contain a symlink traversal vulnerability in avatar handling that allows attackers to read arbitrary files outside the configured workspace boundary. Remote attackers can exploit this by requesting avatar resources through gateway surfaces to disclose local file…

πŸ“… Published: March 19, 2026, 10:07 p.m. πŸ”„ Last Modified: March 23, 2026, 5:46 p.m.
Total resulsts: 349182
Page 1037 of 34,919
Β« previous page Β» next page
Filters