CVE-2026-32036
- EPSS 0.08%
- Veröffentlicht 19.03.2026 22:16:39
- Zuletzt bearbeitet 23.03.2026 17:12:56
OpenClaw gateway plugin versions prior to 2026.2.26 contain a path traversal vulnerability that allows remote attackers to bypass route authentication checks by manipulating /api/channels paths with encoded dot-segment traversal sequences. Attackers ...
CVE-2026-32037
- EPSS 0.03%
- Veröffentlicht 19.03.2026 22:16:39
- Zuletzt bearbeitet 23.03.2026 17:15:11
OpenClaw versions prior to 2026.2.22 fail to consistently validate redirect chains against configured mediaAllowHosts allowlists during MSTeams media downloads. Attackers can supply or influence attachment URLs to force redirects to non-allowlisted t...
- EPSS 0.06%
- Veröffentlicht 19.03.2026 22:16:39
- Zuletzt bearbeitet 23.03.2026 17:18:25
OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container:<id> values to reach ...
CVE-2026-32029
- EPSS 0.03%
- Veröffentlicht 19.03.2026 22:16:38
- Zuletzt bearbeitet 25.03.2026 15:16:45
OpenClaw versions prior to 2026.2.21 improperly parse the left-most X-Forwarded-For header value when requests originate from configured trusted proxies, allowing attackers to spoof client IP addresses. In proxy chains that append or preserve header ...
CVE-2026-32030
- EPSS 0.07%
- Veröffentlicht 19.03.2026 22:16:38
- Zuletzt bearbeitet 25.03.2026 15:16:45
OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the stageSandboxMedia function that accepts arbitrary absolute paths when iMessage remote attachment fetching is enabled. An attacker who can tamper with attachment path m...
CVE-2026-32031
- EPSS 0.05%
- Veröffentlicht 19.03.2026 22:16:38
- Zuletzt bearbeitet 23.03.2026 15:05:47
OpenClaw versions prior to 2026.2.26 server-http contains an authentication bypass vulnerability in gateway authentication for plugin channel endpoints due to path canonicalization mismatch between the gateway guard and plugin handler routing. Attack...
CVE-2026-32032
- EPSS 0.02%
- Veröffentlicht 19.03.2026 22:16:38
- Zuletzt bearbeitet 25.03.2026 15:16:46
OpenClaw versions prior to 2026.2.22 contain an arbitrary shell execution vulnerability in shell environment fallback that trusts the unvalidated SHELL path from the host environment. An attacker with local environment access can inject a malicious S...
CVE-2026-32033
- EPSS 0.05%
- Veröffentlicht 19.03.2026 22:16:38
- Zuletzt bearbeitet 25.03.2026 15:16:46
OpenClaw versions prior to 2026.2.24 contain a path traversal vulnerability where @-prefixed absolute paths bypass workspace-only file-system boundary validation due to canonicalization mismatch. Attackers can exploit this by crafting @-prefixed path...
CVE-2026-32025
- EPSS 0.07%
- Veröffentlicht 19.03.2026 22:16:37
- Zuletzt bearbeitet 23.03.2026 17:12:07
OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in browser-origin WebSocket clients that allows attackers to bypass origin checks and auth throttling on loopback deployments. An attacker can trick a user into opening a ma...
CVE-2026-32026
- EPSS 0.06%
- Veröffentlicht 19.03.2026 22:16:37
- Zuletzt bearbeitet 23.03.2026 17:13:41
OpenClaw versions prior to 2026.2.24 contain an improper path validation vulnerability in sandbox media handling that allows absolute paths under the host temporary directory outside the active sandbox root. Attackers can exploit this by providing ma...