CVE-2026-28395
- EPSS 0.1%
- Veröffentlicht 05.03.2026 21:59:23
- Zuletzt bearbeitet 06.03.2026 17:16:28
OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper network binding vulnerability in the Chrome extension (must be installed and enabled) relay server that treats wildcard hosts as loopback addresses, allowing the relay HTTP/WS server...
CVE-2026-28394
- EPSS 0.14%
- Veröffentlicht 05.03.2026 21:59:22
- Zuletzt bearbeitet 05.03.2026 23:16:21
OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability in the web_fetch tool that allows attackers to crash the Gateway process through memory exhaustion by parsing oversized or deeply nested HTML responses. Remote attackers c...
CVE-2026-28393
- EPSS 0.04%
- Veröffentlicht 05.03.2026 21:59:22
- Zuletzt bearbeitet 06.03.2026 17:16:27
OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal ...
CVE-2026-28392
- EPSS 0.04%
- Veröffentlicht 05.03.2026 21:59:20
- Zuletzt bearbeitet 06.03.2026 17:16:27
OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privil...
CVE-2026-28391
- EPSS 0.11%
- Veröffentlicht 05.03.2026 21:59:19
- Zuletzt bearbeitet 06.03.2026 17:16:27
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests (non-default configuration), allowing attackers to bypass command approval restrictions. Remote attackers can craft command ...
CVE-2026-28363
- EPSS 0.1%
- Veröffentlicht 27.02.2026 03:17:37
- Zuletzt bearbeitet 27.02.2026 19:13:57
In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. On...
- EPSS 0.01%
- Veröffentlicht 21.02.2026 10:16:13
- Zuletzt bearbeitet 23.02.2026 20:39:31
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very large prompt text blocks and can assemble oversized prompt payloads before forwarding them to chat.send. Because ACP runs over local stdio, this mainly ...
CVE-2026-27488
- EPSS 0.02%
- Veröffentlicht 21.02.2026 09:49:04
- Zuletzt bearbeitet 23.02.2026 20:41:07
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/gateway/server-cron.ts uses fetch() directly, so webhook targets can reach private/metadata/internal endpoints without SSRF policy checks. This issue w...
- EPSS 0.06%
- Veröffentlicht 21.02.2026 09:35:28
- Zuletzt bearbeitet 23.02.2026 20:41:59
OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w .......
CVE-2026-27486
- EPSS 0.03%
- Veröffentlicht 21.02.2026 09:32:45
- Zuletzt bearbeitet 24.02.2026 16:53:20
OpenClaw is a personal AI assistant. In versions 2026.2.13 and below of the OpenClaw CLI, the process cleanup uses system-wide process enumeration and pattern matching to terminate processes without verifying if they are owned by the current OpenClaw...