OpenClaw

OpenClaw

80 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:56
  • Zuletzt bearbeitet 06.03.2026 17:16:32

OpenClaw versions 2026.1.30 and earlier, contain an information disclosure vulnerability, patched in 2026.2.1, in the MS Teams attachment downloader (optional extension must be enabled) that leaks bearer tokens to allowlisted suffix domains. When ret...

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:55
  • Zuletzt bearbeitet 05.03.2026 23:16:24

OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerability where Telegram allowlist matching accepts mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identity by obtaining recycled usernames to by...

  • EPSS 0.02%
  • Veröffentlicht 05.03.2026 21:59:54
  • Zuletzt bearbeitet 05.03.2026 22:16:22

OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache poiso...

  • EPSS 0.08%
  • Veröffentlicht 05.03.2026 21:59:53
  • Zuletzt bearbeitet 05.03.2026 22:16:22

OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to web...

  • EPSS 0.02%
  • Veröffentlicht 05.03.2026 21:59:52
  • Zuletzt bearbeitet 06.03.2026 17:16:32

OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback d...

  • EPSS 0.05%
  • Veröffentlicht 05.03.2026 21:59:51
  • Zuletzt bearbeitet 06.03.2026 17:16:32

OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the configure...

  • EPSS 0.06%
  • Veröffentlicht 05.03.2026 21:59:50
  • Zuletzt bearbeitet 05.03.2026 23:16:23

OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:49
  • Zuletzt bearbeitet 06.03.2026 17:16:31

OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:48
  • Zuletzt bearbeitet 06.03.2026 17:16:31

OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without provi...

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:47
  • Zuletzt bearbeitet 06.03.2026 17:16:31

OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver va...