6.9

CVSS4.0

CVE-2026-27545 - OpenClaw < 2026.2.26 - Approval Bypass via Parent Symlink Current Working Directory Rebind

OpenClaw versions prior to 2026.2.26 contain an approval bypass vulnerability in system.run execution that allows attackers to execute commands from unintended filesystem locations by rebinding writable parent symlinks in the current working directory after approval. An attacker can modify mutable โ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 24, 2026, 10:59 a.m.

2.3

CVSS4.0

CVE-2026-27524 - OpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path

OpenClaw versions prior to 2026.2.21 accept prototype-reserved keys in runtime /debug set override object values, allowing prototype pollution attacks. Authorized /debug set callers can inject __proto__, constructor, or prototype keys to manipulate object prototypes and bypass command gate restrictโ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

6.9

CVSS4.0

CVE-2026-27523 - OpenClaw < 2026.2.24 - Sandbox Bind Validation Bypass via Symlink-Parent Missing-Leaf Paths

OpenClaw versions prior to 2026.2.24 contain a sandbox bind validation vulnerability allowing attackers to bypass allowed-root and blocked-path checks via symlinked parent directories with non-existent leaf paths. Attackers can craft bind source paths that appear within allowed roots but resolve ouโ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 24, 2026, 10:53 a.m.

7.1

CVSS4.0

CVE-2026-27522 - OpenClaw < 2026.2.24 - Arbitrary File Read via sendAttachment and setGroupIcon Message Actions

OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability in sendAttachment and setGroupIcon message actions when sandboxRoot is unset. Attackers can hydrate media from local absolute paths to read arbitrary host files accessible by the runtime user.

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 24, 2026, 10:53 a.m.

5.8

CVSS4.0

CVE-2026-22217 - OpenClaw 2026.2.22 < 2026.2.23 - Arbitrary Binary Execution via $SHELL Environment Variable Trustedโ€ฆ

OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-prefix fallback logic for the $SHELL variable. An attacker can influence the $SHELL environment variable oโ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

6.1

CVSS4.0

CVE-2026-22181 - OpenClaw < 2026.3.2 - DNS Pinning Bypass via Environment Proxy Configuration in web_fetch

OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass vulnerability in strict URL fetch paths that allows attackers to circumvent SSRF guards when environment proxy variables are configured. When HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables are present, attacker-influencedโ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

4.8

CVSS4.0

CVE-2026-22180 - OpenClaw < 2026.3.2 - Path Confinement Bypass in Browser Output and File Write Operations

OpenClaw versions prior to 2026.3.2 contain a path-confinement bypass vulnerability in browser output handling that allows writes outside intended root directories. Attackers can exploit insufficient canonical path-boundary validation in file write operations to escape root-bound restrictions and wโ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 24, 2026, 10:53 a.m.

7.5

CVSS4.0

CVE-2026-22179 - OpenClaw < 2026.2.22 - Allowlist Bypass via Command Substitution in system.run

OpenClaw versions prior to 2026.2.22 in macOS node-host system.run contain an allowlist bypass vulnerability that allows remote attackers to execute non-allowlisted commands by exploiting improper parsing of command substitution tokens. Attackers can craft shell payloads with command substitution sโ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 3:16 p.m.

6.9

CVSS4.0

CVE-2026-22178 - OpenClaw < 2026.2.19 - ReDoS and Regex Injection via Unescaped Feishu Mention Metadata

OpenClaw versions prior to 2026.2.19 construct RegExp objects directly from unescaped Feishu mention metadata in the stripBotMention function, allowing regex injection and denial of service. Attackers can craft nested-quantifier patterns or metacharacters in mention metadata to trigger catastrophicโ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: March 24, 2026, 10:53 a.m.

6.9

CVSS4.0

CVE-2026-22177 - OpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars

OpenClaw versions prior to 2026.2.21 fail to filter dangerous process-control environment variables from config env.vars, allowing startup-time code execution. Attackers can inject variables like NODE_OPTIONS or LD_* through configuration to execute arbitrary code in the OpenClaw gateway service ruโ€ฆ

๐Ÿ“… Published: March 18, 2026, 1:34 a.m. ๐Ÿ”„ Last Modified: April 8, 2026, 5:21 p.m.
Total resulsts: 349182
Page 1068 of 34,919
ยซ previous page ยป next page
Filters