OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 18.03.2026 02:16:22
  • Zuletzt bearbeitet 19.03.2026 16:07:51

OpenClaw versions prior to 2026.2.19 construct RegExp objects directly from unescaped Feishu mention metadata in the stripBotMention function, allowing regex injection and denial of service. Attackers can craft nested-quantifier patterns or metachara...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 18.03.2026 02:16:22
  • Zuletzt bearbeitet 25.03.2026 15:16:36

OpenClaw versions prior to 2026.2.22 in macOS node-host system.run contain an allowlist bypass vulnerability that allows remote attackers to execute non-allowlisted commands by exploiting improper parsing of command substitution tokens. Attackers can...

  • EPSS 0.01%
  • Veröffentlicht 18.03.2026 02:16:22
  • Zuletzt bearbeitet 20.03.2026 20:51:12

OpenClaw versions prior to 2026.3.2 contain a path-confinement bypass vulnerability in browser output handling that allows writes outside intended root directories. Attackers can exploit insufficient canonical path-boundary validation in file write o...

  • EPSS 0.05%
  • Veröffentlicht 18.03.2026 02:16:22
  • Zuletzt bearbeitet 25.03.2026 15:16:36

OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass vulnerability in strict URL fetch paths that allows attackers to circumvent SSRF guards when environment proxy variables are configured. When HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY envir...

  • EPSS 0.07%
  • Veröffentlicht 18.03.2026 02:16:21
  • Zuletzt bearbeitet 25.03.2026 15:16:36

OpenClaw versions prior to 2026.2.22 with the optional BlueBubbles plugin contain an access control bypass vulnerability where empty allowFrom configuration causes dmPolicy pairing and allowlist restrictions to be ineffective. Remote attackers can se...

  • EPSS 0.05%
  • Veröffentlicht 18.03.2026 02:16:21
  • Zuletzt bearbeitet 19.03.2026 14:52:49

OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow where untrusted media keys are interpolated directly into temporary file paths in extensions/feishu/src/media.ts. An attacker who can contro...

  • EPSS 0.02%
  • Veröffentlicht 18.03.2026 02:16:21
  • Zuletzt bearbeitet 25.03.2026 15:16:36

OpenClaw versions prior to 2026.2.22 inject the x-OpenClaw-relay-token header into Chrome CDP probe traffic on loopback interfaces, allowing local processes to capture the Gateway authentication token. An attacker controlling a loopback port can inte...

  • EPSS 0.06%
  • Veröffentlicht 18.03.2026 02:16:21
  • Zuletzt bearbeitet 19.03.2026 16:06:32

OpenClaw versions prior to 2026.2.23 contain an exec approval bypass vulnerability in allowlist mode where allow-always grants could be circumvented through unrecognized multiplexer shell wrappers like busybox and toybox sh -c commands. Attackers can...

  • EPSS 0.05%
  • Veröffentlicht 18.03.2026 02:16:21
  • Zuletzt bearbeitet 08.04.2026 17:21:14

OpenClaw versions prior to 2026.2.21 fail to filter dangerous process-control environment variables from config env.vars, allowing startup-time code execution. Attackers can inject variables like NODE_OPTIONS or LD_* through configuration to execute ...

  • EPSS 0.06%
  • Veröffentlicht 18.03.2026 02:16:20
  • Zuletzt bearbeitet 19.03.2026 14:48:09

OpenClaw versions prior to 2026.2.21 contain an approval-integrity mismatch vulnerability in system.run that allows authenticated operators to execute arbitrary trailing arguments after cmd.exe /c while approval text reflects only a benign command. A...