OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 18.03.2026 02:16:20
  • Zuletzt bearbeitet 25.03.2026 15:16:35

OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safeBins configuration that allows attackers to invoke external helpers through the compress-program option. When sort is explicitly added to tools.exec.safeBins, r...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2026 21:22:29
  • Zuletzt bearbeitet 24.03.2026 21:36:21

OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrust...

  • EPSS 0.09%
  • Veröffentlicht 12.03.2026 12:15:59
  • Zuletzt bearbeitet 16.03.2026 18:02:55

A vulnerability was determined in OpenClaw 2026.2.19-2. This vulnerability affects the function applySkillConfigenvOverrides of the component Skill Env Handler. Executing a manipulation can lead to code injection. It is possible to launch the attack ...

  • EPSS 0.01%
  • Veröffentlicht 12.03.2026 12:15:59
  • Zuletzt bearbeitet 16.03.2026 18:06:44

A vulnerability was identified in OpenClaw up to 2026.2.17. This issue affects the function tools.exec.safeBins of the component File Existence Handler. The manipulation leads to information exposure through discrepancy. The attack needs to be perfor...

Exploit
  • EPSS 0.38%
  • Veröffentlicht 11.03.2026 16:16:41
  • Zuletzt bearbeitet 17.03.2026 15:51:41

A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6 allows attackers to execute arbitrary code via a Request-Side prompt injection attack.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 11.03.2026 13:32:36
  • Zuletzt bearbeitet 16.03.2026 17:52:56

OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vulnerability in systemd unit file generation where attacker-controlled environment values are not validated for CR/LF characters, allowing newline injection to break out of...

  • EPSS 0.14%
  • Veröffentlicht 11.03.2026 13:32:35
  • Zuletzt bearbeitet 26.03.2026 12:48:57

OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attacker...

  • EPSS 0.02%
  • Veröffentlicht 11.03.2026 13:32:34
  • Zuletzt bearbeitet 16.03.2026 18:00:12

OpenClaw versions prior to 2026.2.17 contain a path traversal vulnerability in the $include directive resolution that allows reading arbitrary local files outside the config directory boundary. Attackers with config modification capabilities can expl...

  • EPSS 0.41%
  • Veröffentlicht 11.03.2026 13:32:33
  • Zuletzt bearbeitet 16.03.2026 17:39:12

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containment, ...

  • EPSS 0.07%
  • Veröffentlicht 11.03.2026 13:32:32
  • Zuletzt bearbeitet 16.03.2026 17:38:55

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can ex...