CVE-2026-32020
- EPSS 0.02%
- Veröffentlicht 19.03.2026 22:16:35
- Zuletzt bearbeitet 23.03.2026 18:13:56
OpenClaw versions prior to 2026.2.22 contain a path traversal vulnerability in the static file handler that follows symbolic links, allowing out-of-root file reads. Attackers can place symlinks under the Control UI root directory to bypass directory ...
CVE-2026-32011
- EPSS 0.06%
- Veröffentlicht 19.03.2026 22:16:34
- Zuletzt bearbeitet 23.03.2026 18:29:20
OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can explo...
CVE-2026-32013
- EPSS 0.11%
- Veröffentlicht 19.03.2026 22:16:34
- Zuletzt bearbeitet 23.03.2026 18:29:35
OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files t...
- EPSS 0.03%
- Veröffentlicht 19.03.2026 22:16:34
- Zuletzt bearbeitet 23.03.2026 19:09:38
OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity o...
CVE-2026-32015
- EPSS 0.01%
- Veröffentlicht 19.03.2026 22:16:34
- Zuletzt bearbeitet 25.03.2026 15:16:43
OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a path hijacking vulnerability in tools.exec.safeBins that allows attackers to bypass allowlist checks by controlling process PATH resolution. Attackers who can influence the gateway process PATH...
CVE-2026-32006
- EPSS 0.04%
- Veröffentlicht 19.03.2026 22:16:33
- Zuletzt bearbeitet 24.03.2026 21:22:22
OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly treated as group allowlist identities when dmPolicy=pairing and groupPolicy=allowlist. Remote attackers can send mess...
CVE-2026-32007
- EPSS 0.05%
- Veröffentlicht 19.03.2026 22:16:33
- Zuletzt bearbeitet 24.03.2026 21:22:35
OpenClaw versions prior to 2026.2.23 contain a path traversal vulnerability in the experimental apply_patch tool that allows attackers with sandbox access to modify files outside the workspace directory by exploiting inconsistent enforcement of works...
CVE-2026-32008
- EPSS 0.04%
- Veröffentlicht 19.03.2026 22:16:33
- Zuletzt bearbeitet 23.03.2026 17:34:08
OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation vulnerability in the assertBrowserNavigationAllowed() function that allows authenticated users with browser-tool access to navigate to file:// URLs. Attackers can exploit ...
CVE-2026-32009
- EPSS 0.01%
- Veröffentlicht 19.03.2026 22:16:33
- Zuletzt bearbeitet 23.03.2026 18:33:03
OpenClaw versions prior to 2026.2.24 contain a policy bypass vulnerability in the safeBins allowlist evaluation that trusts static default directories including writable package-manager paths like /opt/homebrew/bin and /usr/local/bin. An attacker wit...
CVE-2026-32010
- EPSS 0.04%
- Veröffentlicht 19.03.2026 22:16:33
- Zuletzt bearbeitet 23.03.2026 18:29:04
OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safe-bin configuration when sort is manually added to tools.exec.safeBins. Attackers can invoke sort with the --compress-program flag to execute arbitrary external ...