CVE-2026-35669
- EPSS 0.04%
- Veröffentlicht 10.04.2026 16:03:27
- Zuletzt bearbeitet 13.04.2026 21:06:24
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in gateway-authenticated plugin HTTP routes that incorrectly mint operator.admin runtime scope regardless of caller-granted scopes. Attackers can exploit this scope boundary bypa...
CVE-2026-35667
- EPSS 0.01%
- Veröffentlicht 10.04.2026 16:03:26
- Zuletzt bearbeitet 13.04.2026 15:02:06
OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-27486 where the !stop chat command uses an unpatched killProcessTree function from shell-utils.ts that sends SIGKILL immediately without graceful SIGTERM shutdown. Attackers can trigge...
CVE-2026-35665
- EPSS 0.04%
- Veröffentlicht 10.04.2026 16:03:25
- Zuletzt bearbeitet 13.04.2026 20:42:44
OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request bodies with permissive limits of 1MB and 30-second timeout before signature verification. An unauthenticated attacker can exhaust...
CVE-2026-35666
- EPSS 0.04%
- Veröffentlicht 10.04.2026 16:03:25
- Zuletzt bearbeitet 13.04.2026 20:42:58
OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.run approvals that fails to unwrap /usr/bin/time wrappers. Attackers can bypass executable binding restrictions by using an unregistered time wrapper to reuse approval sta...
CVE-2026-35664
- EPSS 0.05%
- Veröffentlicht 10.04.2026 16:03:24
- Zuletzt bearbeitet 13.04.2026 20:39:15
OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach call...
CVE-2026-35663
- EPSS 0.04%
- Veröffentlicht 10.04.2026 16:03:23
- Zuletzt bearbeitet 13.04.2026 20:39:05
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unauthoriz...
CVE-2026-35661
- EPSS 0.04%
- Veröffentlicht 10.04.2026 16:03:22
- Zuletzt bearbeitet 13.04.2026 20:32:13
OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Telegram callback query handling that allows attackers to mutate session state without satisfying normal DM pairing requirements. Remote attackers can exploit weaker callback...
CVE-2026-35662
- EPSS 0.03%
- Veröffentlicht 10.04.2026 16:03:22
- Zuletzt bearbeitet 13.04.2026 20:32:22
OpenClaw before 2026.3.22 fails to enforce controlScope restrictions on the send action, allowing leaf subagents to message controlled child sessions beyond their authorized scope. Attackers can exploit this by using the send action to communicate wi...
CVE-2026-35660
- EPSS 0.04%
- Veröffentlicht 10.04.2026 16:03:21
- Zuletzt bearbeitet 13.04.2026 20:32:00
OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions. Attackers with operator.write privileges can invoke /rese...
CVE-2026-35658
- EPSS 0.04%
- Veröffentlicht 10.04.2026 16:03:20
- Zuletzt bearbeitet 13.04.2026 20:31:46
OpenClaw before 2026.3.2 contains a filesystem boundary bypass vulnerability in the image tool that fails to honor tools.fs.workspaceOnly restrictions. Attackers can traverse sandbox bridge mounts outside the workspace to read files that other filesy...