OpenClaw

OpenClaw

331 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 05.03.2026 21:59:35
  • Zuletzt bearbeitet 09.03.2026 17:28:40

OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopback...

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:34
  • Zuletzt bearbeitet 09.03.2026 17:43:38

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide ...

  • EPSS 0.1%
  • Veröffentlicht 05.03.2026 21:59:32
  • Zuletzt bearbeitet 09.03.2026 18:01:46

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway c...

  • EPSS 0.09%
  • Veröffentlicht 05.03.2026 21:59:31
  • Zuletzt bearbeitet 09.03.2026 18:04:19

OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ../...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:31
  • Zuletzt bearbeitet 09.03.2026 18:03:30

OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can fo...

  • EPSS 0.17%
  • Veröffentlicht 05.03.2026 21:59:29
  • Zuletzt bearbeitet 09.03.2026 18:30:09

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR ar...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:28
  • Zuletzt bearbeitet 11.03.2026 16:15:12

OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image pr...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 05.03.2026 21:59:27
  • Zuletzt bearbeitet 11.03.2026 16:02:04

OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a vulnerability in the Twitch plugin (must be installed and enabled) in which it fails to enforce the allowFrom allowlist when allowedRoles is unset or empty, allowing unauthorized Twitch users to...

  • EPSS 0.12%
  • Veröffentlicht 05.03.2026 21:59:27
  • Zuletzt bearbeitet 11.03.2026 16:04:57

OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profi...

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:26
  • Zuletzt bearbeitet 10.03.2026 19:43:11

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing path...