CVE-2026-26972
- EPSS 0.01%
- Veröffentlicht 19.02.2026 23:08:44
- Zuletzt bearbeitet 20.02.2026 19:03:33
OpenClaw is a personal AI assistant. In versions 2026.1.12 through 2026.2.12, OpenClaw browser download helpers accepted an unsanitized output path. When invoked via the browser control gateway routes, this allowed path traversal to write downloads o...
CVE-2026-26329
- EPSS 0.02%
- Veröffentlicht 19.02.2026 23:06:37
- Zuletzt bearbeitet 20.02.2026 19:05:23
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, authenticated attackers can read arbitrary files from the Gateway host by supplying absolute paths or path traversal sequences to the browser tool's `upload` action. The server passed t...
CVE-2026-26328
- EPSS 0.01%
- Veröffentlicht 19.02.2026 23:04:12
- Zuletzt bearbeitet 26.02.2026 18:41:00
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, under iMessage `groupPolicy=allowlist`, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts. Version 20...
CVE-2026-26327
- EPSS 0%
- Veröffentlicht 19.02.2026 22:59:36
- Zuletzt bearbeitet 23.02.2026 13:44:36
OpenClaw is a personal AI assistant. Discovery beacons (Bonjour/mDNS and DNS-SD) include TXT records such as `lanHost`, `tailnetDns`, `gatewayPort`, and `gatewayTlsSha256`. TXT records are unauthenticated. Prior to version 2026.2.14, some clients tre...
CVE-2026-26326
- EPSS 0.01%
- Veröffentlicht 19.02.2026 22:55:53
- Zuletzt bearbeitet 23.02.2026 13:46:15
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, `skills.status` could disclose secrets to `operator.read` clients by returning raw resolved config values in `configChecks` for skill `requires.config` paths. Version 2026.2.14 stops in...
CVE-2026-26325
- EPSS 0.03%
- Veröffentlicht 19.02.2026 22:53:17
- Zuletzt bearbeitet 23.02.2026 13:47:10
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between `rawCommand` and `command[]` in the node host `system.run` handler could cause allowlist/approval evaluation to be performed on one command while executing a differen...
CVE-2026-26324
- EPSS 0.02%
- Veröffentlicht 19.02.2026 22:49:24
- Zuletzt bearbeitet 23.02.2026 18:13:45
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should be b...
CVE-2026-26323
- EPSS 0.06%
- Veröffentlicht 19.02.2026 22:47:47
- Zuletzt bearbeitet 20.02.2026 19:06:15
OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script `scripts/update-clawtributors.ts`. The issue affects contributors/maintainers (or CI) who run `bun scripts/update-clawtribu...
CVE-2026-26322
- EPSS 0.02%
- Veröffentlicht 19.02.2026 22:33:10
- Zuletzt bearbeitet 20.02.2026 19:12:17
OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-sp...
CVE-2026-26321
- EPSS 0.03%
- Veröffentlicht 19.02.2026 22:28:07
- Zuletzt bearbeitet 20.02.2026 19:12:08
OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can in...