6

CVSS4.0

CVE-2026-32023 - OpenClaw < 2026.2.24 - Approval Gating Bypass via Dispatch-Wrapper Depth-Cap Mismatch in system.run

OpenClaw versions prior to 2026.2.24 contain an approval gating bypass vulnerability in system.run allowlist mode where nested transparent dispatch wrappers can suppress shell-wrapper detection. Attackers can exploit this by chaining multiple dispatch wrappers like /usr/bin/env to execute /bin/sh -โ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

6

CVSS4.0

CVE-2026-32022 - OpenClaw < 2026.2.21 - Arbitrary File Read via grep -e Flag Policy Bypass

OpenClaw versions prior to 2026.2.21 contain a stdin-only policy bypass vulnerability in the grep tool within tools.exec.safeBins that allows attackers to read arbitrary files by supplying a pattern via the -e flag parameter. Attackers can include a positional filename operand to bypass file accessโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

6.3

CVSS4.0

CVE-2026-32021 - OpenClaw < 2026.2.22 - Authorization Bypass via Display Name Collision in Feishu allowFrom

OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in the Feishu allowFrom allowlist implementation that accepts mutable sender display names instead of enforcing ID-only matching. An attacker can set a display name equal to an allowlisted ID string to bypass authoriโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 31, 2026, 3:33 p.m.

4.8

CVSS4.0

CVE-2026-32020 - OpenClaw < 2026.2.22 - Arbitrary File Read via Symlink Following in Static File Handler

OpenClaw versions prior to 2026.2.22 contain a path traversal vulnerability in the static file handler that follows symbolic links, allowing out-of-root file reads. Attackers can place symlinks under the Control UI root directory to bypass directory confinement checks and read arbitrary files outsiโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 11:54 a.m.

2.3

CVSS4.0

CVE-2026-32019 - OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard

OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ranges can exploit web_fetch functionality to accโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

2

CVSS4.0

CVE-2026-32018 - OpenClaw < 2026.2.19 - Race Condition in Sandbox Registry Write Operations

OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, โ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 2:59 p.m.

6

CVSS4.0

CVE-2026-32017 - OpenClaw < 2026.2.19 - Arbitrary File Write via Short-Option Bypass in exec Allowlist

OpenClaw versions prior to 2026.2.19 contain an allowlist bypass vulnerability in the exec safeBins policy that allows attackers to write arbitrary files using short-option payloads. Attackers can bypass argument validation by attaching short options like -o to whitelisted binaries, enabling unauthโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

7.3

CVSS4.0

CVE-2026-32016 - OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS

OpenClaw versions prior to 2026.2.22 on macOS contain a path validation bypass vulnerability in the exec-approval allowlist mode that allows local attackers to execute unauthorized binaries by exploiting basename-only allowlist entries. Attackers can execute same-name local binaries ./echo without โ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

7.3

CVSS4.0

CVE-2026-32015 - OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Validation

OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a path hijacking vulnerability in tools.exec.safeBins that allows attackers to bypass allowlist checks by controlling process PATH resolution. Attackers who can influence the gateway process PATH or launch environment can execute trojan binarieโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

8.6

CVSS4.0

CVE-2026-32014 - OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields

OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadatโ€ฆ

๐Ÿ“… Published: March 19, 2026, 10:06 p.m. ๐Ÿ”„ Last Modified: March 23, 2026, 7:09 p.m.
Total resulsts: 349182
Page 1038 of 34,919
ยซ previous page ยป next page
Filters