OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 19.03.2026 22:16:35
  • Zuletzt bearbeitet 23.03.2026 18:13:56

OpenClaw versions prior to 2026.2.22 contain a path traversal vulnerability in the static file handler that follows symbolic links, allowing out-of-root file reads. Attackers can place symlinks under the Control UI root directory to bypass directory ...

  • EPSS 0.06%
  • Veröffentlicht 19.03.2026 22:16:34
  • Zuletzt bearbeitet 23.03.2026 18:29:20

OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can explo...

  • EPSS 0.11%
  • Veröffentlicht 19.03.2026 22:16:34
  • Zuletzt bearbeitet 23.03.2026 18:29:35

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files t...

  • EPSS 0.03%
  • Veröffentlicht 19.03.2026 22:16:34
  • Zuletzt bearbeitet 23.03.2026 19:09:38

OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity o...

  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 22:16:34
  • Zuletzt bearbeitet 25.03.2026 15:16:43

OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a path hijacking vulnerability in tools.exec.safeBins that allows attackers to bypass allowlist checks by controlling process PATH resolution. Attackers who can influence the gateway process PATH...

  • EPSS 0.04%
  • Veröffentlicht 19.03.2026 22:16:33
  • Zuletzt bearbeitet 24.03.2026 21:22:22

OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly treated as group allowlist identities when dmPolicy=pairing and groupPolicy=allowlist. Remote attackers can send mess...

  • EPSS 0.05%
  • Veröffentlicht 19.03.2026 22:16:33
  • Zuletzt bearbeitet 24.03.2026 21:22:35

OpenClaw versions prior to 2026.2.23 contain a path traversal vulnerability in the experimental apply_patch tool that allows attackers with sandbox access to modify files outside the workspace directory by exploiting inconsistent enforcement of works...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 19.03.2026 22:16:33
  • Zuletzt bearbeitet 23.03.2026 17:34:08

OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation vulnerability in the assertBrowserNavigationAllowed() function that allows authenticated users with browser-tool access to navigate to file:// URLs. Attackers can exploit ...

  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 22:16:33
  • Zuletzt bearbeitet 23.03.2026 18:33:03

OpenClaw versions prior to 2026.2.24 contain a policy bypass vulnerability in the safeBins allowlist evaluation that trusts static default directories including writable package-manager paths like /opt/homebrew/bin and /usr/local/bin. An attacker wit...

  • EPSS 0.04%
  • Veröffentlicht 19.03.2026 22:16:33
  • Zuletzt bearbeitet 23.03.2026 18:29:04

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safe-bin configuration when sort is manually added to tools.exec.safeBins. Attackers can invoke sort with the --compress-program flag to execute arbitrary external ...