OpenClaw

OpenClaw

80 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 05.03.2026 21:59:46
  • Zuletzt bearbeitet 05.03.2026 22:16:20

OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:45
  • Zuletzt bearbeitet 06.03.2026 17:16:31

OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-...

  • EPSS 0.02%
  • Veröffentlicht 05.03.2026 21:59:44
  • Zuletzt bearbeitet 06.03.2026 17:16:31

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A ...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:43
  • Zuletzt bearbeitet 06.03.2026 17:16:30

OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlle...

  • EPSS 0.08%
  • Veröffentlicht 05.03.2026 21:59:42
  • Zuletzt bearbeitet 06.03.2026 17:16:30

OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attac...

  • EPSS 0.17%
  • Veröffentlicht 05.03.2026 21:59:40
  • Zuletzt bearbeitet 06.03.2026 17:16:30

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side...

  • EPSS 0.02%
  • Veröffentlicht 05.03.2026 21:59:39
  • Zuletzt bearbeitet 05.03.2026 22:16:19

OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized ca...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:38
  • Zuletzt bearbeitet 05.03.2026 22:16:18

OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API ...

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:37
  • Zuletzt bearbeitet 06.03.2026 17:16:30

OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the s...

  • EPSS 0.05%
  • Veröffentlicht 05.03.2026 21:59:35
  • Zuletzt bearbeitet 06.03.2026 17:16:30

OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopback...