OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 20.04.2026 23:08:17
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.3.31 contains a resource consumption vulnerability in Telegram audio preflight transcription that allows unauthorized group senders to trigger transcription processing. Attackers can exploit insufficient allowlist enforcement to ...

  • EPSS 0.04%
  • Veröffentlicht 20.04.2026 23:08:16
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbo...

  • EPSS 0.01%
  • Veröffentlicht 20.04.2026 23:08:16
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables ...

  • EPSS 0.06%
  • Veröffentlicht 20.04.2026 23:08:15
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.3.28 contains an authorization bypass vulnerability in Discord text approval commands that allows non-approvers to resolve pending exec approvals. Attackers can send Discord text commands to bypass the channels.discord.execApprov...

  • EPSS 0.02%
  • Veröffentlicht 20.04.2026 23:08:14
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw versions 2026.3.22 before 2026.3.31 contain a signature verification bypass vulnerability in the Nostr DM ingress path that allows pairing challenges to be issued before event signature validation. An unauthenticated remote attacker can send...

  • EPSS 0.04%
  • Veröffentlicht 20.04.2026 23:08:14
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows remote attackers to make arbitrary network requests. Attackers can exploit unguarded fetch() calls to access i...

  • EPSS 0.03%
  • Veröffentlicht 20.04.2026 23:08:13
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.3.31 contains a trust-decline vulnerability that preserves attacker-discovered endpoints in remote onboarding flows. Attackers can route gateway credentials to malicious endpoints by having their discovered URL survive the trust ...

  • EPSS 0.05%
  • Veröffentlicht 20.04.2026 23:08:12
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.3.28 contains an authorization bypass vulnerability in the chat.send gateway method where ACP-only provenance fields are gated by self-declared client metadata from WebSocket handshake rather than verified authorization state. Au...

  • EPSS 0.03%
  • Veröffentlicht 20.04.2026 23:08:11
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.4.2 fails to enforce write scopes on the POST /sessions/:sessionKey/kill endpoint in identity-bearing HTTP modes. Read-scoped callers can terminate running subagent sessions by sending requests to this endpoint, bypassing authori...

  • EPSS 0.03%
  • Veröffentlicht 20.04.2026 23:08:10
  • Zuletzt bearbeitet 21.04.2026 16:20:24

OpenClaw before 2026.3.31 contains a time-of-check-time-of-use race condition in the remote filesystem bridge readFile function that allows sandbox escape. Attackers can exploit the separate path validation and file read operations to bypass sandbox ...