CVE-2026-29613
- EPSS 0.03%
- Veröffentlicht 05.03.2026 22:00:11
- Zuletzt bearbeitet 06.03.2026 17:16:35
OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of conf...
CVE-2026-29612
- EPSS 0.04%
- Veröffentlicht 05.03.2026 22:00:10
- Zuletzt bearbeitet 05.03.2026 23:16:25
OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause me...
CVE-2026-29611
- EPSS 0.02%
- Veröffentlicht 05.03.2026 22:00:09
- Zuletzt bearbeitet 06.03.2026 17:16:35
OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBubble...
CVE-2026-29610
- EPSS 0.05%
- Veröffentlicht 05.03.2026 22:00:07
- Zuletzt bearbeitet 06.03.2026 17:16:34
OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with ...
CVE-2026-29609
- EPSS 0.1%
- Veröffentlicht 05.03.2026 22:00:06
- Zuletzt bearbeitet 05.03.2026 22:16:24
OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by servin...
CVE-2026-29606
- EPSS 0.04%
- Veröffentlicht 05.03.2026 22:00:05
- Zuletzt bearbeitet 06.03.2026 17:16:34
OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification bypass in the voice-call extension that allows unauthenticated requests when the tunnel.allowNgrokFreeTierLoopbackBypass option is explicitly enabled. An external attacker ...
CVE-2026-28486
- EPSS 0.01%
- Veröffentlicht 05.03.2026 22:00:02
- Zuletzt bearbeitet 05.03.2026 23:16:25
OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a path traversal vulnerability in archive extraction during installation commands that allows arbitrary file writes outside the intended directory. Attackers can craft malicious archives that, ...
CVE-2026-28485
- EPSS 0.06%
- Veröffentlicht 05.03.2026 21:59:59
- Zuletzt bearbeitet 05.03.2026 22:16:23
OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or local p...
CVE-2026-28484
- EPSS 0.05%
- Veröffentlicht 05.03.2026 21:59:58
- Zuletzt bearbeitet 06.03.2026 17:16:32
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2026-28482
- EPSS 0.03%
- Veröffentlicht 05.03.2026 21:59:57
- Zuletzt bearbeitet 06.03.2026 17:16:32
OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/pas...