OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 19.03.2026 22:16:37
  • Zuletzt bearbeitet 26.03.2026 17:16:35

OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly eligible for group allowlist authorization checks. Attackers can exploit this cross-context authorization flaw by usi...

  • EPSS 0.03%
  • Veröffentlicht 19.03.2026 22:16:37
  • Zuletzt bearbeitet 25.03.2026 15:16:45

OpenClaw versions prior to 2026.2.25 fail to enforce dmPolicy and allowFrom authorization checks on Discord direct-message reaction notifications, allowing non-allowlisted users to enqueue reaction-derived system events. Attackers can exploit this in...

  • EPSS 0.04%
  • Veröffentlicht 19.03.2026 22:16:36
  • Zuletzt bearbeitet 25.03.2026 15:16:44

OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in the Feishu allowFrom allowlist implementation that accepts mutable sender display names instead of enforcing ID-only matching. An attacker can set a display name eq...

  • EPSS 0.06%
  • Veröffentlicht 19.03.2026 22:16:36
  • Zuletzt bearbeitet 25.03.2026 15:16:44

OpenClaw versions prior to 2026.2.21 contain a stdin-only policy bypass vulnerability in the grep tool within tools.exec.safeBins that allows attackers to read arbitrary files by supplying a pattern via the -e flag parameter. Attackers can include a ...

  • EPSS 0.04%
  • Veröffentlicht 19.03.2026 22:16:36
  • Zuletzt bearbeitet 25.03.2026 15:16:45

OpenClaw versions prior to 2026.2.24 contain an approval gating bypass vulnerability in system.run allowlist mode where nested transparent dispatch wrappers can suppress shell-wrapper detection. Attackers can exploit this by chaining multiple dispatc...

  • EPSS 0.05%
  • Veröffentlicht 19.03.2026 22:16:36
  • Zuletzt bearbeitet 23.03.2026 17:46:50

OpenClaw versions prior to 2026.2.22 contain a symlink traversal vulnerability in avatar handling that allows attackers to read arbitrary files outside the configured workspace boundary. Remote attackers can exploit this by requesting avatar resource...

  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 22:16:35
  • Zuletzt bearbeitet 25.03.2026 15:16:43

OpenClaw versions prior to 2026.2.22 on macOS contain a path validation bypass vulnerability in the exec-approval allowlist mode that allows local attackers to execute unauthorized binaries by exploiting basename-only allowlist entries. Attackers can...

  • EPSS 0.04%
  • Veröffentlicht 19.03.2026 22:16:35
  • Zuletzt bearbeitet 25.03.2026 15:16:44

OpenClaw versions prior to 2026.2.19 contain an allowlist bypass vulnerability in the exec safeBins policy that allows attackers to write arbitrary files using short-option payloads. Attackers can bypass argument validation by attaching short options...

  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 22:16:35
  • Zuletzt bearbeitet 20.04.2026 14:03:44

OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without...

  • EPSS 0.05%
  • Veröffentlicht 19.03.2026 22:16:35
  • Zuletzt bearbeitet 20.04.2026 13:51:07

OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ...