OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 19.03.2026 01:00:46
  • Zuletzt bearbeitet 19.03.2026 19:18:18

OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger in-memory key accumulation by varying query strings. Remote attackers can exploit this ...

  • EPSS 0.06%
  • Veröffentlicht 19.03.2026 01:00:45
  • Zuletzt bearbeitet 25.03.2026 15:16:39

OpenClaw versions prior to 2026.2.25 lack durable replay state for Nextcloud Talk webhook events, allowing valid signed webhook requests to be replayed without suppression. Attackers can capture and replay previously valid signed webhook requests to ...

  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 01:00:44
  • Zuletzt bearbeitet 19.03.2026 19:18:45

OpenClaw versions prior to 2026.3.2 contain a race condition vulnerability in ZIP extraction that allows local attackers to write files outside the intended destination directory. Attackers can exploit a time-of-check-time-of-use race between path va...

  • EPSS 0.08%
  • Veröffentlicht 19.03.2026 01:00:43
  • Zuletzt bearbeitet 19.03.2026 19:20:08

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run exec analysis that fails to unwrap env and shell-dispatch wrapper chains. Attackers can route execution through wrapper binaries like env bash to smuggle pay...

  • EPSS 0.05%
  • Veröffentlicht 19.03.2026 01:00:42
  • Zuletzt bearbeitet 19.03.2026 19:20:20

OpenClaw versions prior to 2026.2.19 contain a command injection vulnerability in Windows Scheduled Task script generation where environment variables are written to gateway.cmd using unquoted set KEY=VALUE assignments, allowing shell metacharacters ...

  • EPSS 0.01%
  • Veröffentlicht 18.03.2026 02:16:23
  • Zuletzt bearbeitet 25.03.2026 15:16:37

OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-prefix fallback logic for the $SHELL variable. An attacke...

  • EPSS 0.04%
  • Veröffentlicht 18.03.2026 02:16:23
  • Zuletzt bearbeitet 18.03.2026 20:05:50

OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability in sendAttachment and setGroupIcon message actions when sandboxRoot is unset. Attackers can hydrate media from local absolute paths to read arbitrary host files acce...

  • EPSS 0.05%
  • Veröffentlicht 18.03.2026 02:16:23
  • Zuletzt bearbeitet 18.03.2026 20:04:53

OpenClaw versions prior to 2026.2.24 contain a sandbox bind validation vulnerability allowing attackers to bypass allowed-root and blocked-path checks via symlinked parent directories with non-existent leaf paths. Attackers can craft bind source path...

  • EPSS 0.04%
  • Veröffentlicht 18.03.2026 02:16:23
  • Zuletzt bearbeitet 25.03.2026 15:16:39

OpenClaw versions prior to 2026.2.21 accept prototype-reserved keys in runtime /debug set override object values, allowing prototype pollution attacks. Authorized /debug set callers can inject __proto__, constructor, or prototype keys to manipulate o...

  • EPSS 0.03%
  • Veröffentlicht 18.03.2026 02:16:23
  • Zuletzt bearbeitet 18.03.2026 19:51:34

OpenClaw versions prior to 2026.2.26 contain an approval bypass vulnerability in system.run execution that allows attackers to execute commands from unintended filesystem locations by rebinding writable parent symlinks in the current working director...