OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 19.03.2026 22:16:32
  • Zuletzt bearbeitet 23.03.2026 18:51:27

OpenClaw versions prior to 2026.2.22 contain an authentication bypass vulnerability that allows clients authenticated with a shared gateway token to connect as role=node without device identity verification. Attackers can exploit this by claiming the...

  • EPSS 0.03%
  • Veröffentlicht 19.03.2026 22:16:32
  • Zuletzt bearbeitet 23.03.2026 18:53:37

OpenClaw versions prior to 2026.2.23 contain a sandbox bypass vulnerability in the sandboxed image tool that fails to enforce tools.fs.workspaceOnly restrictions on mounted sandbox paths, allowing attackers to read out-of-workspace files. Attackers c...

  • EPSS 0.07%
  • Veröffentlicht 19.03.2026 22:16:32
  • Zuletzt bearbeitet 23.03.2026 18:57:22

OpenClaw versions prior to 2026.2.22 contain an environment variable injection vulnerability in the system.run function that allows attackers to bypass command allowlist restrictions via SHELLOPTS and PS4 environment variables. An attacker who can in...

  • EPSS 0.07%
  • Veröffentlicht 19.03.2026 22:16:32
  • Zuletzt bearbeitet 23.03.2026 19:12:08

OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass...

  • EPSS 0.03%
  • Veröffentlicht 19.03.2026 22:16:32
  • Zuletzt bearbeitet 24.03.2026 21:22:47

OpenClaw versions prior to 2026.2.25 fail to enforce sender authorization checks for interactive callbacks including block_action, view_submission, and view_closed in shared workspace deployments. Unauthorized workspace members can bypass allowFrom r...

  • EPSS 0.05%
  • Veröffentlicht 19.03.2026 01:00:57
  • Zuletzt bearbeitet 25.03.2026 15:16:43

OpenClaw versions prior to 2026.2.19 contain a command injection vulnerability in the Lobster extension tool execution that uses Windows shell fallback with shell: true after spawn failures. Attackers can inject shell metacharacters in command argume...

  • EPSS 0.07%
  • Veröffentlicht 19.03.2026 01:00:56
  • Zuletzt bearbeitet 19.03.2026 18:47:48

OpenClaw versions 2026.2.26 prior to 2026.3.1 on Windows contain a current working directory injection vulnerability in wrapper resolution for .cmd/.bat files that allows attackers to influence execution behavior through cwd manipulation. Remote atta...

  • EPSS 0.06%
  • Veröffentlicht 19.03.2026 01:00:55
  • Zuletzt bearbeitet 25.03.2026 15:16:43

OpenClaw versions 2026.2.22 and 2026.2.23 contain an authorization bypass vulnerability in the synology-chat channel plugin where dmPolicy set to allowlist with empty allowedUserIds fails open. Attackers with Synology sender access can bypass authori...

  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 01:00:54
  • Zuletzt bearbeitet 25.03.2026 15:16:43

OpenClaw versions prior to 2026.2.19 tools.exec.safeBins contains an input validation bypass vulnerability that allows attackers to execute unintended filesystem operations through sort output flags or recursive grep flags. Attackers with command exe...

  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 01:00:54
  • Zuletzt bearbeitet 19.03.2026 18:49:06

OpenClaw versions prior to 2026.3.1 fail to pin executable identity for non-path-like argv[0] tokens in system.run approvals, allowing post-approval executable rebind attacks. Attackers can modify PATH resolution after approval to execute a different...