OpenClaw

OpenClaw

80 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 05.03.2026 21:59:34
  • Zuletzt bearbeitet 06.03.2026 17:16:29

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide ...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:32
  • Zuletzt bearbeitet 06.03.2026 17:16:29

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway c...

  • EPSS 0.03%
  • Veröffentlicht 05.03.2026 21:59:31
  • Zuletzt bearbeitet 06.03.2026 17:16:29

OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can fo...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:31
  • Zuletzt bearbeitet 05.03.2026 22:16:17

OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ../...

  • EPSS 0.06%
  • Veröffentlicht 05.03.2026 21:59:29
  • Zuletzt bearbeitet 05.03.2026 23:16:22

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR ar...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:28
  • Zuletzt bearbeitet 06.03.2026 17:16:29

OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image pr...

  • EPSS 0.1%
  • Veröffentlicht 05.03.2026 21:59:27
  • Zuletzt bearbeitet 06.03.2026 17:16:28

OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profi...

  • EPSS 0.06%
  • Veröffentlicht 05.03.2026 21:59:27
  • Zuletzt bearbeitet 06.03.2026 17:16:28

OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a vulnerability in the Twitch plugin (must be installed and enabled) in which it fails to enforce the allowFrom allowlist when allowedRoles is unset or empty, allowing unauthorized Twitch users to...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 21:59:26
  • Zuletzt bearbeitet 06.03.2026 17:16:28

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing path...

  • EPSS 0.27%
  • Veröffentlicht 05.03.2026 21:59:24
  • Zuletzt bearbeitet 06.03.2026 17:16:28

OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of stri...