OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 05.03.2026 21:59:46
  • Zuletzt bearbeitet 25.03.2026 15:16:40

OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:45
  • Zuletzt bearbeitet 09.03.2026 20:29:33

OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-...

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:44
  • Zuletzt bearbeitet 11.03.2026 16:00:31

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 05.03.2026 21:59:43
  • Zuletzt bearbeitet 09.03.2026 15:28:05

OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlle...

  • EPSS 0.11%
  • Veröffentlicht 05.03.2026 21:59:42
  • Zuletzt bearbeitet 09.03.2026 15:30:16

OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attac...

  • EPSS 0.18%
  • Veröffentlicht 05.03.2026 21:59:41
  • Zuletzt bearbeitet 10.03.2026 18:18:46

OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook e...

  • EPSS 0.19%
  • Veröffentlicht 05.03.2026 21:59:40
  • Zuletzt bearbeitet 09.03.2026 17:14:04

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side...

  • EPSS 0.02%
  • Veröffentlicht 05.03.2026 21:59:39
  • Zuletzt bearbeitet 08.04.2026 14:16:27

OpenClaw versions prior to 2026.2.14 contain an arbitrary file read vulnerability in the exec-approvals allowlist validation that checks pre-expansion argv tokens but executes using real shell expansion. Attackers with authorization or through prompt...

  • EPSS 0.07%
  • Veröffentlicht 05.03.2026 21:59:38
  • Zuletzt bearbeitet 09.03.2026 17:32:54

OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API ...

  • EPSS 0.05%
  • Veröffentlicht 05.03.2026 21:59:37
  • Zuletzt bearbeitet 09.03.2026 17:39:46

OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the s...