2.3

CVSS4.0

CVE-2026-44111 - OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get

OpenClaw before 2026.4.15 contains an arbitrary file read vulnerability in the QMD backend memory_get function that allows callers to read any Markdown files within the workspace root. Attackers with access to the memory tool can bypass path restrictions by providing arbitrary workspace Markdown paโ€ฆ

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 7:49 p.m.

7.7

CVSS4.0

CVE-2026-44110 - OpenClaw < 2026.4.15 - Authorization Bypass in Matrix Room Control Commands via DM Pairing Store

OpenClaw before 2026.4.15 contains an authorization bypass vulnerability in Matrix room control-command authorization that trusts DM pairing-store entries. Attackers with DM-paired sender IDs can execute room control commands without being in configured allowlists by posting in bot rooms, potentialโ€ฆ

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 7:49 p.m.

9.2

CVSS4.0

CVE-2026-44109 - OpenClaw < 2026.4.15 - Authentication Bypass in Feishu Webhook and Card-Action Validation

OpenClaw before 2026.4.15 contains an authentication bypass vulnerability in Feishu webhook and card-action validation that allows unauthenticated requests to reach command dispatch. Missing encryptKey configuration and blank callback tokens fail open instead of rejecting requests, enabling attackeโ€ฆ

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 7:49 p.m.

9.2

CVSS4.0

CVE-2026-43585 - OpenClaw < 2026.4.15 - Bearer Token Validation Bypass via Stale SecretRef Resolution

OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorizedโ€ฆ

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 7, 2026, 1:53 p.m.

8.7

CVSS4.0

CVE-2026-43584 - OpenClaw < 2026.4.10 - Insufficient Environment Variable Denylist in Exec Policy

OpenClaw before 2026.4.10 contains an insufficient environment variable denylist vulnerability in its exec environment policy that allows operator-supplied overrides of high-risk interpreter startup variables including VIMINIT, EXINIT, LUA_INIT, and HOSTALIASES. Attackers can exploit this by manipuโ€ฆ

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 7, 2026, 2:59 p.m.

6

CVSS4.0

CVE-2026-43583 - OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Policy Context in Delivery Queue Recovery

OpenClaw versions 2026.4.10 before 2026.4.14 fail to persist session context during delivery queue recovery for media replay. Attackers can exploit recovered queued outbound media to bypass group tool policy enforcement and weaken channel media restrictions after service restart or recovery.

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 7, 2026, 5:30 p.m.

4.9

CVSS4.0

CVE-2026-43582 - OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname Validation Bypass

OpenClaw before 2026.4.10 contains a server-side request forgery vulnerability in browser navigation policy that allows attackers to bypass hostname validation through DNS rebinding attacks. Attackers can exploit inconsistent hostname resolution between validation and actual network requests to pivโ€ฆ

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 7, 2026, 12:32 p.m.

9

CVSS4.0

CVE-2026-43581 - OpenClaw < 2026.4.10 - Chrome DevTools Protocol Exposure via Overly Broad CDP Relay Binding

OpenClaw before 2026.4.10 contains an improper network binding vulnerability in the sandbox browser CDP relay that exposes Chrome DevTools Protocol on 0.0.0.0. Attackers can access the DevTools protocol outside intended local sandbox boundaries by exploiting the overly broad binding configuration.

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 7, 2026, 1:55 p.m.

4.9

CVSS4.0

CVE-2026-43580 - OpenClaw < 2026.4.10 - Incomplete Navigation Guard Coverage in Browser Interactions

OpenClaw before 2026.4.10 contains an incomplete navigation guard vulnerability that allows attackers to trigger navigation without complete SSRF policy enforcement. Browser press/type style interactions, including pressKey and type submit flows, can bypass post-action security checks to execute unโ€ฆ

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 7:49 p.m.

6

CVSS4.0

CVE-2026-43579 - OpenClaw < 2026.4.10 - Insufficient Access Control in Nostr Profile Mutation Routes

OpenClaw before 2026.4.10 contains an insufficient access control vulnerability in Nostr plugin HTTP profile routes that allows operators with write permissions to persist profile configuration without requiring admin authority. Attackers with operator.write scope can modify Nostr profile settings โ€ฆ

๐Ÿ“… Published: May 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: May 7, 2026, 1:54 p.m.
Total resulsts: 349182
Page 59 of 34,919
ยซ previous page ยป next page
Filters