8.7

CVSS4.0

CVE-2026-32013 - OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway proc…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 23, 2026, 6:29 p.m.

8.7

CVSS4.0

CVE-2026-32011 - OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing

OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can exploit this by sending slow or oversized request bodi…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 23, 2026, 6:29 p.m.

5.8

CVSS4.0

CVE-2026-32010 - OpenClaw < 2026.2.22 - Allowlist Bypass via sort --compress-program Parameter

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safe-bin configuration when sort is manually added to tools.exec.safeBins. Attackers can invoke sort with the --compress-program flag to execute arbitrary external programs without operator approval in allowlist m…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 23, 2026, 6:29 p.m.

7

CVSS4.0

CVE-2026-32009 - OpenClaw < 2026.2.24 - Binary Hijacking via Static Default Trusted Directories in safeBins

OpenClaw versions prior to 2026.2.24 contain a policy bypass vulnerability in the safeBins allowlist evaluation that trusts static default directories including writable package-manager paths like /opt/homebrew/bin and /usr/local/bin. An attacker with write access to these trusted directories can p…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 23, 2026, 6:33 p.m.

7.1

CVSS4.0

CVE-2026-32008 - OpenClaw < 2026.2.21 - Arbitrary Local File Read via Browser Navigation Guard

OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation vulnerability in the assertBrowserNavigationAllowed() function that allows authenticated users with browser-tool access to navigate to file:// URLs. Attackers can exploit this by accessing local files readable by the Ope…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 23, 2026, 5:34 p.m.

7.6

CVSS4.0

CVE-2026-32007 - OpenClaw < 2026.2.23 - Sandbox Bypass in apply_patch Tool via Workspace-Only Check Bypass

OpenClaw versions prior to 2026.2.23 contain a path traversal vulnerability in the experimental apply_patch tool that allows attackers with sandbox access to modify files outside the workspace directory by exploiting inconsistent enforcement of workspace-only checks on mounted paths. Attackers can …

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 24, 2026, 9:22 p.m.

2.3

CVSS4.0

CVE-2026-32006 - OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Fallback in Group Allowlist

OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly treated as group allowlist identities when dmPolicy=pairing and groupPolicy=allowlist. Remote attackers can send messages and reactions as DM-paired identities withou…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 24, 2026, 9:22 p.m.

7.6

CVSS4.0

CVE-2026-32005 - OpenClaw < 2026.2.25 - Authorization Bypass in Interactive Callbacks via Sender Check Skip

OpenClaw versions prior to 2026.2.25 fail to enforce sender authorization checks for interactive callbacks including block_action, view_submission, and view_closed in shared workspace deployments. Unauthorized workspace members can bypass allowFrom restrictions and channel user allowlists to enqueu…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 24, 2026, 9:22 p.m.

8.3

CVSS4.0

CVE-2026-32004 - OpenClaw < 2026.3.2 - Authentication Bypass via Encoded Path in /api/channels Route

OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass plugin route authentication checks by submitting…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 23, 2026, 7:12 p.m.

7.5

CVSS4.0

CVE-2026-32003 - OpenClaw < 2026.2.22 - Remote Code Execution via SHELLOPTS/PS4 Environment Injection in system.run

OpenClaw versions prior to 2026.2.22 contain an environment variable injection vulnerability in the system.run function that allows attackers to bypass command allowlist restrictions via SHELLOPTS and PS4 environment variables. An attacker who can invoke system.run with request-scoped environment v…

πŸ“… Published: March 19, 2026, 10:06 p.m. πŸ”„ Last Modified: March 23, 2026, 6:57 p.m.
Total resulsts: 349182
Page 1039 of 34,919
Β« previous page Β» next page
Filters