OpenClaw

OpenClaw

80 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 22:00:11
  • Zuletzt bearbeitet 06.03.2026 17:16:35

OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of conf...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 22:00:10
  • Zuletzt bearbeitet 05.03.2026 23:16:25

OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause me...

  • EPSS 0.02%
  • Veröffentlicht 05.03.2026 22:00:09
  • Zuletzt bearbeitet 06.03.2026 17:16:35

OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBubble...

  • EPSS 0.05%
  • Veröffentlicht 05.03.2026 22:00:07
  • Zuletzt bearbeitet 06.03.2026 17:16:34

OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with ...

  • EPSS 0.1%
  • Veröffentlicht 05.03.2026 22:00:06
  • Zuletzt bearbeitet 05.03.2026 22:16:24

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by servin...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 22:00:05
  • Zuletzt bearbeitet 06.03.2026 17:16:34

OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification bypass in the voice-call extension that allows unauthenticated requests when the tunnel.allowNgrokFreeTierLoopbackBypass option is explicitly enabled. An external attacker ...

  • EPSS 0.01%
  • Veröffentlicht 05.03.2026 22:00:02
  • Zuletzt bearbeitet 05.03.2026 23:16:25

OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a path traversal vulnerability in archive extraction during installation commands that allows arbitrary file writes outside the intended directory. Attackers can craft malicious archives that, ...

  • EPSS 0.06%
  • Veröffentlicht 05.03.2026 21:59:59
  • Zuletzt bearbeitet 05.03.2026 22:16:23

OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or local p...

  • EPSS 0.05%
  • Veröffentlicht 05.03.2026 21:59:58
  • Zuletzt bearbeitet 06.03.2026 17:16:32

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:57
  • Zuletzt bearbeitet 06.03.2026 17:16:32

OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/pas...