CVE-2026-35625
- EPSS 0.03%
- Veröffentlicht 09.04.2026 22:16:30
- Zuletzt bearbeitet 16.04.2026 13:43:35
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where silent local shared-auth reconnects auto-approve scope-upgrade requests, widening paired device permissions from operator.read to operator.admin. Attackers can exploit this...
CVE-2026-34512
- EPSS 0.03%
- Veröffentlicht 09.04.2026 22:16:29
- Zuletzt bearbeitet 15.04.2026 17:23:36
OpenClaw before 2026.3.25 contains an improper access control vulnerability in the HTTP /sessions/:sessionKey/kill route that allows any bearer-authenticated user to invoke admin-level session termination functions without proper scope validation. At...
CVE-2026-35617
- EPSS 0.05%
- Veröffentlicht 09.04.2026 22:16:29
- Zuletzt bearbeitet 16.04.2026 14:19:04
OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Google Chat group policy enforcement that relies on mutable space display names. Attackers can rebind group policies by changing or colliding space display names to gain unau...
CVE-2026-40037
- EPSS 0.03%
- Veröffentlicht 08.04.2026 21:35:29
- Zuletzt bearbeitet 13.04.2026 20:27:30
OpenClaw before 2026.3.31 (patched in 2026.4.8) contains a request body replay vulnerability in fetchWithSsrFGuard that allows unsafe request bodies to be resent across cross-origin redirects. Attackers can exploit this by triggering redirects to exf...
CVE-2026-34511
- EPSS 0.03%
- Veröffentlicht 03.04.2026 20:45:41
- Zuletzt bearbeitet 07.04.2026 13:20:55
OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating ...
CVE-2026-34426
- EPSS 0.04%
- Veröffentlicht 02.04.2026 18:25:14
- Zuletzt bearbeitet 06.04.2026 20:53:53
OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables int...
CVE-2026-34425
- EPSS 0.05%
- Veröffentlicht 02.04.2026 18:15:06
- Zuletzt bearbeitet 15.04.2026 17:40:58
OpenClaw versions prior to commit 8aceaf5 contain a preflight validation bypass vulnerability in shell-bleed protection that allows attackers to execute blocked script content by using piped or complex command forms that the parser fails to recognize...
CVE-2026-34510
- EPSS 0.06%
- Veröffentlicht 01.04.2026 15:29:35
- Zuletzt bearbeitet 07.04.2026 19:21:54
OpenClaw before 2026.3.22 contains a path traversal vulnerability in Windows media loaders that accepts remote-host file URLs and UNC-style paths before local-path validation. Attackers can exploit this by providing network-hosted file targets that a...
CVE-2026-34504
- EPSS 0.05%
- Veröffentlicht 31.03.2026 14:10:35
- Zuletzt bearbeitet 02.04.2026 12:20:31
OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability in the fal provider image-generation-provider.ts component that allows attackers to fetch internal URLs. A malicious or compromised fal relay can exploit unguarded image d...
CVE-2026-34503
- EPSS 0.03%
- Veröffentlicht 31.03.2026 14:10:34
- Zuletzt bearbeitet 02.04.2026 12:21:24
OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when devices are removed or tokens are revoked. Attackers with revoked credentials can maintain unauthorized access through existing live sessions until forced reconnection.