An automated tracker that continuously monitors OpenClaw security advisories across the GitHub Advisory Database, repo-level security advisories, and the CVE V5 (cvelistV5) registry. Every hour it pulls the latest data, reconciles GHSA → CVE publication state, and regenerates this dashboard so you always have an up-to-date picture of the project's vulnerability landscape.
Last updated: 2026-03-11 06:23 UTC · MIT License · Full Advisory List · Security Policy · Data: cvelistV5 + Advisory DB · Updates hourly
Published CVEs · Pipeline · Advisories · Categories · Insights · Identity
| Field | Value |
|---|---|
| Current Name | OpenClaw |
| Previous Names | Moltbot (second name), Clawdbot (original name) |
| Repository | openclaw/openclaw |
| npm Package | openclaw (formerly clawdbot) |
| Author | Peter Steinberger (steipete) |
To find all CVEs, search for: openclaw, clawdbot, moltbot, clawhub, pkg:npm/clawdbot, pkg:npm/openclaw
These CVEs have full records in the CVEProject/cvelistV5 repository:
| CVE ID | Severity | CVSS | Title | CWE | Published |
|---|---|---|---|---|---|
| CVE-2026-28363 | 9.9 | In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be… | CWE-184 | 2026-02-27 | |
| CVE-2026-28466 | 9.4 | OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass | CWE-863 | 2026-03-05 | |
| CVE-2026-28474 | 9.3 | OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing | CWE-863 | 2026-03-05 | |
| CVE-2026-28446 | 9.2 | OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching | CWE-303 | 2026-03-05 | |
| CVE-2026-28391 | 9.2 | OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcement | CWE-184 | 2026-03-05 | |
| CVE-2026-28472 | 9.2 | OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake | CWE-306 | 2026-03-05 | |
| CVE-2026-28470 | 9.2 | OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double Quotes | CWE-88 | 2026-03-05 | |
| CVE-2026-24763 | 8.8 | OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable | CWE-78 | 2026-02-02 | |
| CVE-2026-25253 | 8.8 | OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl | CWE-669 | 2026-02-01 | |
| CVE-2026-28462 | 8.7 | OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths | CWE-22 | 2026-03-05 | |
| CVE-2026-28478 | 8.7 | OpenClaw affected by denial of service via unbounded webhook request body buffering | CWE-770 | 2026-03-05 | |
| CVE-2026-28479 | 8.7 | OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration | CWE-327 | 2026-03-05 | |
| CVE-2026-29609 | 8.7 | OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media Fetch | CWE-770 | 2026-03-05 | |
| CVE-2026-26323 | 8.6 | OpenClaw has a command injection in maintainer clawtributors updater | CWE-78 | 2026-02-19 | |
| CVE-2026-27001 | 8.6 | OpenClaw: Unsanitized CWD path injection into LLM prompts | CWE-77 | 2026-02-19 | |
| CVE-2026-28456 | 8.6 | OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path Handling | CWE-427 | 2026-03-05 | |
| CVE-2026-28463 | 8.6 | OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist | CWE-78 | 2026-03-05 | |
| CVE-2026-28468 | 8.5 | OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server | CWE-306 | 2026-03-05 | |
| CVE-2026-25593 | 8.4 | OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply | CWE-78, CWE-306 | 2026-02-06 | |
| CVE-2026-28482 | 8.4 | OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters | CWE-22 | 2026-03-05 | |
| CVE-2026-28393 | 8.3 | OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal | CWE-427 | 2026-03-05 | |
| CVE-2026-28453 | 8.3 | OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction | CWE-22 | 2026-03-05 | |
| CVE-2026-28450 | 8.3 | OpenClaw < 2026.2.12 - Unauthenticated Profile Tampering via Nostr Plugin HTTP Endpoints | CWE-306 | 2026-03-05 | |
| CVE-2026-28392 | 8.2 | OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages | CWE-863 | 2026-03-05 | |
| CVE-2026-28454 | 8.2 | OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram Webhook | CWE-345 | 2026-03-05 | |
| CVE-2026-28464 | 8.2 | OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication | CWE-208 | 2026-03-05 | |
| CVE-2026-28465 | 8.2 | OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers | CWE-345 | 2026-03-05 | |
| CVE-2026-28469 | 8.2 | OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting | CWE-639 | 2026-03-05 | |
| CVE-2026-29613 | 8.2 | OpenClaw < 2026.2.12 - Webhook Authentication Bypass via Loopback remoteAddress Trust | CWE-306 | 2026-03-05 | |
| CVE-2026-29611 | 8.2 | OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media Handling | CWE-73 | 2026-03-05 | |
| CVE-2026-25157 | 7.8 | OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand | CWE-78 | 2026-02-04 | |
| CVE-2026-27002 | 7.7 | OpenClaw: Docker container escape via unvalidated bind mount config injection | CWE-250 | 2026-02-19 | |
| CVE-2026-29610 | 7.7 | OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling | CWE-427 | 2026-03-05 | |
| CVE-2026-26322 | 7.6 | OpenClaw Gateway tool allowed unrestricted gatewayUrl override | CWE-918 | 2026-02-19 | |
| CVE-2026-27487 | 7.6 | OpenClaw: Prevent shell injection in macOS keychain credential write | CWE-78 | 2026-02-21 | |
| CVE-2026-25474 | 7.5 | OpenClaw has a Telegram webhook request forgery (missing channels.telegram.webhookSecret) → auth bypass | CWE-345 | 2026-02-19 | |
| CVE-2026-26319 | 7.5 | OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests | CWE-306 | 2026-02-19 | |
| CVE-2026-26321 | 7.5 | OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension | CWE-22 | 2026-02-19 | |
| CVE-2026-26316 | 7.5 | OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust | CWE-863 | 2026-02-19 | |
| CVE-2026-26324 | 7.5 | OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) | CWE-918 | 2026-02-19 | |
| CVE-2026-28485 | 7.5 | OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints | CWE-306 | 2026-03-05 | |
| CVE-2026-28458 | 7.4 | OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access | CWE-306 | 2026-03-05 | |
| CVE-2026-26325 | 7.2 | OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals | CWE-284 | 2026-02-19 | |
| CVE-2026-28473 | 7.2 | OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command | CWE-863 | 2026-03-05 | |
| CVE-2026-26317 | 7.1 | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | CWE-352 | 2026-02-19 | |
| CVE-2026-26320 | 7.1 | OpenClaw macOS deep link confirmation truncation can conceal executed agent message | CWE-451 | 2026-02-19 | |
| CVE-2026-26329 | 7.1 | OpenClaw has a path traversal in browser upload allows local file read | CWE-22 | 2026-02-19 | |
| CVE-2026-26327 | 7.1 | OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning | CWE-345 | 2026-02-19 | |
| CVE-2026-28459 | 7.1 | OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile Path | CWE-73 | 2026-03-05 | |
| CVE-2026-28447 | 7 | OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package Name | CWE-22 | 2026-03-05 | |
| CVE-2026-27003 | 6.9 | OpenClaw: Telegram bot token exposure via logs | CWE-522 | 2026-02-19 | |
| CVE-2026-27004 | 6.9 | OpenClaw session tool visibility hardening and Telegram webhook secret fallback | CWE-209, CWE-346 | 2026-02-19 | |
| CVE-2026-27488 | 6.9 | OpenClaw hardened cron webhook delivery against SSRF | CWE-918 | 2026-02-21 | |
| CVE-2026-28394 | 6.9 | OpenClaw < 2026.2.15 - Denial of Service via Unbounded Response Parsing in web_fetch Tool | CWE-770 | 2026-03-05 | |
| CVE-2026-28467 | 6.9 | OpenClaw < 2026.2.2 - SSRF via Attachment Media URL Hydration | CWE-918 | 2026-03-05 | |
| CVE-2026-28480 | 6.9 | OpenClaw Telegram allowlist authorization accepted mutable usernames | CWE-290 | 2026-03-05 | |
| CVE-2026-27008 | 6.8 | OpenClaw hardened the skill download target directory validation | CWE-73 | 2026-02-19 | |
| CVE-2026-28486 | 6.8 | OpenClaw 2026.1.16-2 < 2026.2.14 - Path Traversal (Zip Slip) in Archive Extraction via Installation Commands | CWE-22 | 2026-03-05 | |
| CVE-2026-29612 | 6.8 | OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding | CWE-770 | 2026-03-05 | |
| CVE-2026-26972 | 6.7 | OpenClaw has a Path Traversal in Browser Download Functionality | CWE-22 | 2026-02-19 | |
| CVE-2026-28452 | 6.7 | OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) | CWE-770 | 2026-03-05 | |
| CVE-2026-25475 | 6.5 | OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction | CWE-200, CWE-22 | 2026-02-04 | |
| CVE-2026-26328 | 6.5 | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities | CWE-284, CWE-863 | 2026-02-19 | |
| CVE-2026-28448 | 6.3 | OpenClaw 2026.1.29 < 2026.2.1 - Authorization Bypass in Twitch Plugin allowFrom Access Control | CWE-285 | 2026-03-05 | |
| CVE-2026-28395 | 6.3 | OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrl | CWE-1327 | 2026-03-05 | |
| CVE-2026-28451 | 6.3 | OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching | CWE-918 | 2026-03-05 | |
| CVE-2026-28475 | 6.3 | OpenClaw < 2026.2.13 - Timing Attack via Hook Token Comparison | CWE-208 | 2026-03-05 | |
| CVE-2026-28471 | 6.3 | OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin | CWE-287 | 2026-03-05 | |
| CVE-2026-29606 | 6.3 | OpenClaw < 2026.2.14 - Webhook Signature Verification Bypass via ngrok Loopback Compatibility | CWE-306 | 2026-03-05 | |
| CVE-2026-28476 | 6.3 | OpenClaw < 2026.2.14 - Server-Side Request Forgery in Tlon Extension Authentication | CWE-918 | 2026-03-05 | |
| CVE-2026-28477 | 5.9 | OpenClaw < 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow | CWE-352 | 2026-03-05 | |
| CVE-2026-28481 | 5.9 | OpenClaw < 2026.2.1 - Bearer Token Leakage via MS Teams Attachment Downloader Suffix Matching | CWE-201 | 2026-03-05 | |
| CVE-2026-27009 | 5.8 | OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection | CWE-79 | 2026-02-19 | |
| CVE-2026-28457 | 5.6 | OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter | CWE-22 | 2026-03-05 | |
| CVE-2026-26326 | 5.3 | OpenClaw skills.status could leak secrets to operator.read clients | CWE-200 | 2026-02-19 | |
| CVE-2026-27007 | 4.8 | OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation | CWE-1254 | 2026-02-19 | |
| CVE-2026-27576 | 4.8 | OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs | CWE-400 | 2026-02-21 | |
| CVE-2026-27485 | 4.6 | OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection | CWE-61 | 2026-02-21 | |
| CVE-2026-27486 | 4.3 | OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup | CWE-283 | 2026-02-21 | |
| CVE-2026-24764 | 3.7 | OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions | CWE-74, CWE-94 | 2026-02-19 | |
| CVE-2026-27484 | 2.3 | OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows | CWE-862 | 2026-02-21 |
| Field | Detail |
|---|---|
| CVSS | 9.9 (CRITICAL) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
| CWE | CWE-184 (CWE-184 Incomplete List of Disallowed Inputs) |
| Affected | < 2026.2.23 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-3c6h-g97w-fg78 |
In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.
| Field | Detail |
|---|---|
| CVSS | 9.4 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
| CWE | CWE-863 (Incorrect Authorization) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-gv46-4xfq-jv58 |
OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attackers with valid gateway credentials can inject approval control fields to execute arbitrary commands on connected node hosts, potentially compromising developer workstations and CI runners.
References:
| Field | Detail |
|---|---|
| CVSS | 9.3 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-863 (Incorrect Authorization) |
| Affected | < 2026.2.6 |
| Vendor/Product | OpenClaw / nextcloud-talk |
| Advisory | GHSA-r5h9-vjqc-hq3r |
OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.
References:
| Field | Detail |
|---|---|
| CVSS | 9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-303 (Incorrect Implementation of Authentication Algorithm) |
| Affected | < 2026.2.1 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-4rj2-gpmh-qq5x |
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.
References:
| Field | Detail |
|---|---|
| CVSS | 9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-184 (Incomplete List of Disallowed Inputs) |
| Affected | < 2026.2.2 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-qj77-c3c8-9c3q |
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metacharacters like & or %...% to execute unapproved commands beyond the allowlisted operations.
References:
| Field | Detail |
|---|---|
| CVSS | 9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-306 (Missing Authentication for Critical Function) |
| Affected | < 2026.2.2 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-rv39-79c4-7459 |
OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without providing device identity or pairing by exploiting the presence check instead of validation, potentially gaining operator access in vulnerable deployments.
References:
| Field | Detail |
|---|---|
| CVSS | 9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-88 (Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')) |
| Affected | < 2026.2.2 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-3hcm-ggvf-rch5 |
OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection by embedding unescaped $() or backticks inside double-quoted strings to execute unauthorized commands.
References:
| Field | Detail |
|---|---|
| CVSS | 8.8 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| CWE | CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')) |
| Affected | < 2026.1.29 |
| Vendor/Product | clawdbot / clawdbot |
| Advisory | GHSA-mc68-q9jw-2h3v |
OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the container context. This vulnerability is fixed in 2026.1.29.
Naming note: Uses old name
clawdbot/clawdbotas vendor/product. References:
| Field | Detail |
|---|---|
| CVSS | 8.8 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| CWE | CWE-669 (CWE-669 Incorrect Resource Transfer Between Spheres) |
| Affected | < 2026.1.29 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-g8p2-7wf7-98mq |
OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.
Naming note: Uses all three names in description. packageURL still references
pkg:npm/clawdbot. References:
| Field | Detail |
|---|---|
| CVSS | 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.2.13 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-gq9c-wg68-gwj2 |
OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/stop, POST /wait/download, and POST /download endpoints to write files outside intended temp roots.
References:
| Field | Detail |
|---|---|
| CVSS | 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-770 (Allocation of Resources Without Limits or Throttling) |
| Affected | < 2026.2.13 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-q447-rj3r-2cgh |
OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to webhook endpoints causing memory pressure and availability degradation.
References:
| Field | Detail |
|---|---|
| CVSS | 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) |
| Affected | < 2026.2.15 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-fh3f-q9qw-93j9 |
OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache poisoning, allowing one sandbox configuration to be misinterpreted as another and enabling unsafe sandbox state reuse.
References:
| Field | Detail |
|---|---|
| CVSS | 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-770 (Allocation of Resources Without Limits or Throttling) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-j27p-hq53-9wgc |
OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by serving oversized responses without content-length headers to cause availability loss.
References:
| Field | Detail |
|---|---|
| CVSS | 8.6 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')) |
| Affected | < >= 2026.1.8, < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-m7x8-2w3w-pr42 |
OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script scripts/update-clawtributors.ts. The issue affects contributors/maintainers (or CI) who run bun scripts/update-clawtributors.ts in a source checkout that contains a malicious commit author email (e.g. crafted @users[.]noreply[.]github[.]com values). Normal CLI usage is not affected (npm i -g openclaw): this script is not part of the shipped CLI and is not executed during routine operation. The script derived a GitHub login from git log author metadata and interpolated it into a shell command (via execSync). A malicious commit record could inject shell metacharacters and execute arbitrary commands when the script is run. Version 2026.2.14 contains a patch.
References:
| Field | Detail |
|---|---|
| CVSS | 8.6 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-77 (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')) |
| Affected | < 2026.2.15 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-2qj5-gwg2-xwc4 |
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose name contains control/format characters (for example newlines or Unicode bidi/zero-width markers), those characters could break the prompt structure and inject attacker-controlled instructions. Starting in version 2026.2.15, the workspace path is sanitized before it is embedded into any LLM prompt output, stripping Unicode control/format characters and explicit line/paragraph separators. Workspace path resolution also applies the same sanitization as defense-in-depth.
References:
| Field | Detail |
|---|---|
| CVSS | 8.6 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-427 (Uncontrolled Search Path Element) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-v6c6-vqqg-w888 |
OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process.
References:
| Field | Detail |
|---|---|
| CVSS | 8.6 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-xvhf-x56f-2hpp |
OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.
References:
| Field | Detail |
|---|---|
| CVSS | 8.5 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-306 (Missing Authentication for Critical Function) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-h9g4-589h-68xv |
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts.
References:
| Field | Detail |
|---|---|
| CVSS | 8.4 (HIGH) — CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CWE | CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')), CWE-306 (CWE-306: Missing Authentication for Critical Function) |
| Affected | < 2026.1.20 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-g55j-c2v4-pjcg |
OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling command injection as the gateway user. This vulnerability is fixed in 2026.1.20.
| Field | Detail |
|---|---|
| CVSS | 8.4 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.2.12 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-5xfq-5mr7-426q |
OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.
References:
| Field | Detail |
|---|---|
| CVSS | 8.3 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-427 (Uncontrolled Search Path Element) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-7xhj-55q9-pc3m |
OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges.
References:
| Field | Detail |
|---|---|
| CVSS | 8.3 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-p25h-9q54-ffvw |
OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ../../ to write files outside extraction boundaries, potentially enabling configuration tampering and code execution.
References:
| Field | Detail |
|---|---|
| CVSS | 8.3 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-306 (Missing Authentication for Critical Function) |
| Affected | < 2026.2.12 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-mv9j-6xhh-g383 |
OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profiles without gateway authentication. Remote attackers can exploit these endpoints to read sensitive profile data, modify Nostr profiles, persist malicious changes to gateway configuration, and publish signed Nostr events using the bot's private key when the gateway HTTP port is accessible beyond localhost.
References:
| Field | Detail |
|---|---|
| CVSS | 8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-863 (Incorrect Authorization) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-v773-r54f-q32w |
OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privileged slash commands via direct message to bypass allowlist and access-group restrictions.
References:
| Field | Detail |
|---|---|
| CVSS | 8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-345 (Insufficient Verification of Data Authenticity) |
| Affected | < 2026.2.2 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-fhvm-j76f-qmjv |
OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can forge Telegram updates by spoofing message.from.id and chat.id fields to bypass sender allowlists and execute privileged bot commands.
References:
| Field | Detail |
|---|---|
| CVSS | 8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-208 (Observable Timing Discrepancy) |
| Affected | < 2026.2.12 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-jmm5-fvh5-gf4p |
OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually determine the authentication token.
References:
| Field | Detail |
|---|---|
| CVSS | 8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-345 (Insufficient Verification of Data Authenticity) |
| Affected | < 2026.2.3 |
| Vendor/Product | OpenClaw / voice-call |
| Advisory | GHSA-3m3q-x3gj-f79x |
OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* headers in reverse-proxy configurations that implicitly trust these headers.
References:
| Field | Detail |
|---|---|
| CVSS | 8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-639 (Authorization Bypass Through User-Controlled Key) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-rq6g-px6m-c248 |
OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.
References:
| Field | Detail |
|---|---|
| CVSS | 8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-306 (Missing Authentication for Critical Function) |
| Affected | < 2026.2.12 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-xc7w-v5x6-cc87 |
OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint.
References:
| Field | Detail |
|---|---|
| CVSS | 8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-73 (External Control of File Name or Path) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-rwj8-p9vq-25gv |
OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBubblesMedia function fails to validate mediaPath parameters against an allowlist, enabling attackers to request sensitive files like /etc/passwd and exfiltrate them as media attachments.
References:
| Field | Detail |
|---|---|
| CVSS | 7.8 (HIGH) — CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
| CWE | CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')) |
| Affected | < 2026.1.29 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-q284-4pvr-m585 |
OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-supplied project path in an error message. When the cd command failed, the unescaped path was interpolated directly into an echo statement, allowing arbitrary command execution on the remote SSH host. The parseSSHTarget function did not validate that SSH target strings could not begin with a dash. An attacker-supplied target like -oProxyCommand=... would be interpreted as an SSH configuration flag rather than a hostname, allowing arbitrary command execution on the local machine. This issue has been patched in version 2026.1.29.
| Field | Detail |
|---|---|
| CVSS | 7.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-250 (CWE-250: Execution with Unnecessary Privileges) |
| Affected | < 2026.2.15 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-w235-x559-36mg |
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access. OpenClaw 2026.2.15 blocks dangerous sandbox Docker settings and includes runtime enforcement when building docker create args; config-schema validation for network=host, seccompProfile=unconfined, apparmorProfile=unconfined; and security audit findings to surface dangerous sandbox docker config. As a workaround, do not configure agents.*.sandbox.docker.binds to mount system directories or Docker socket paths, keep agents.*.sandbox.docker.network at none (default) or bridge, and do not use unconfined for seccomp/AppArmor profiles.
References:
| Field | Detail |
|---|---|
| CVSS | 7.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-427 (Uncontrolled Search Path Element) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-jqpq-mgvm-f9r6 |
OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.
References:
| Field | Detail |
|---|---|
| CVSS | 7.6 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L |
| CWE | CWE-918 (CWE-918: Server-Side Request Forgery (SSRF)) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-g6q9-8fvw-f7rf |
OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied gatewayUrl without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets. This requires the ability to invoke tools that accept gatewayUrl overrides (directly or indirectly). In typical setups this is limited to authenticated operators, trusted automation, or environments where tool calls are exposed to non-operators. In other words, this is not a drive-by issue for arbitrary internet users unless a deployment explicitly allows untrusted users to trigger these tool calls. Some tool call paths allowed gatewayUrl overrides to flow into the Gateway WebSocket client without validation or allowlisting. This meant the host could be instructed to attempt connections to non-gateway endpoints (for example, localhost services, private network addresses, or cloud metadata IPs). In the common case, this results in an outbound connection attempt from the OpenClaw host (and corresponding errors/timeouts). In environments where the tool caller can observe the results, this can also be used for limited network reachability probing. If the target speaks WebSocket and is reachable, further interaction may be possible. Starting in version 2026.2.14, tool-supplied gatewayUrl overrides are restricted to loopback (on the configured gateway port) or the configured gateway.remote.url. Disallowed protocols, credentials, query/hash, and non-root paths are rejected.
References:
| Field | Detail |
|---|---|
| CVSS | 7.6 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L |
| CWE | CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-4564-pvr2-qq4h |
OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w .... Because OAuth tokens are user-controlled data, this created an OS command injection risk. This issue has been fixed in version 2026.2.14.
References:
channels.telegram.webhookSecret) → auth bypass| Field | Detail |
|---|---|
| CVSS | 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
| CWE | CWE-345 (CWE-345: Insufficient Verification of Data Authenticity) |
| Affected | < 2026.2.1 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-mp5h-m6qj-6292 |
OpenClaw is a personal AI assistant. In versions 2026.1.30 and below, if channels.telegram.webhookSecret is not set when in Telegram webhook mode, OpenClaw may accept webhook HTTP requests without verifying Telegram’s secret token header. In deployments where the webhook endpoint is reachable by an attacker, this can allow forged Telegram updates (for example spoofing message.from.id). If an attacker can reach the webhook endpoint, they may be able to send forged updates that are processed as if they came from Telegram. Depending on enabled commands/tools and configuration, this could lead to unintended bot actions. Note: Telegram webhook mode is not enabled by default. It is enabled only when channels.telegram.webhookUrl is configured. This issue has been fixed in version 2026.2.1.
References:
| Field | Detail |
|---|---|
| CVSS | 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
| CWE | CWE-306 (CWE-306: Missing Authentication for Critical Function) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-4hg8-92x6-h2f3 |
OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated callers to forge Telnyx events. Telnyx webhooks are expected to be authenticated via Ed25519 signature verification. In affected versions, TelnyxProvider.verifyWebhook() could effectively fail open when no Telnyx public key was configured, allowing arbitrary HTTP POST requests to the voice-call webhook endpoint to be treated as legitimate Telnyx events. This only impacts deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is reachable from the attacker (for example, publicly exposed via a tunnel/proxy). The issue has been fixed in version 2026.2.14.
References:
| Field | Detail |
|---|---|
| CVSS | 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| CWE | CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-8jpq-5h99-ff5r |
OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed sendMediaFeishu to treat attacker-controlled mediaUrl values as local filesystem paths and read them directly. If an attacker can influence tool calls (directly or via prompt injection), they may be able to exfiltrate local files by supplying paths such as /etc/passwd as mediaUrl. Upgrade to OpenClaw 2026.2.14 or newer to receive a fix. The fix removes direct local file reads from this path and routes media loading through hardened helpers that enforce local-root restrictions.
References:
| Field | Detail |
|---|---|
| CVSS | 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
| CWE | CWE-863 (CWE-863: Incorrect Authorization) |
| Affected | < 2026.2.13 |
| Vendor/Product | openclaw / @openclaw/bluebubbles |
| Advisory | GHSA-pchc-86f6-8758 |
OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (127.0.0.1, ::1, ::ffff:127.0.0.1) even when the configured webhook secret was missing or incorrect. This does not affect the default iMessage integration unless BlueBubbles is installed and enabled. Version 2026.2.13 contains a patch. Other mitigations include setting a non-empty BlueBubbles webhook password and avoiding deployments where a public-facing reverse proxy forwards to a loopback-bound Gateway without strong upstream authentication.
References:
| Field | Detail |
|---|---|
| CVSS | 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| CWE | CWE-918 (CWE-918: Server-Side Request Forgery (SSRF)) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-jrvc-8ff5-2f9f |
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as 0:0:0:0:0:ffff:7f00:1 (which is 127.0.0.1). This could allow requests that should be blocked (loopback / private network / link-local metadata) to pass the SSRF guard. Version 2026.2.14 patches the issue.
References:
| Field | Detail |
|---|---|
| CVSS | 7.5 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-306 (Missing Authentication for Critical Function) |
| Affected | < 2026.2.12 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-qpjj-47vm-64pj |
OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or local processes can execute arbitrary browser-context actions and access sensitive in-session data by sending requests to unauthenticated endpoints.
References:
| Field | Detail |
|---|---|
| CVSS | 7.4 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-306 (Missing Authentication for Critical Function) |
| Affected | < 2026.2.1 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-mr32-vwc2-5j6h |
OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopback and access sensitive data. Attackers can exploit this by connecting to ws://127.0.0.1:18792/cdp to steal session cookies and execute JavaScript in other browser tabs.
References:
| Field | Detail |
|---|---|
| CVSS | 7.2 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CWE | CWE-284 (CWE-284: Improper Access Control) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-h3f9-mjwj-w476 |
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between rawCommand and command[] in the node host system.run handler could cause allowlist/approval evaluation to be performed on one command while executing a different argv. This only impacts deployments that use the node host / companion node execution path (system.run on a node), enable allowlist-based exec policy (security=allowlist) with approval prompting driven by allowlist misses (for example ask=on-miss), allow an attacker to invoke system.run. Default/non-node configurations are not affected. Version 2026.2.14 enforces rawCommand/command[] consistency (gateway fail-fast + node host validation).
References:
| Field | Detail |
|---|---|
| CVSS | 7.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-863 (Incorrect Authorization) |
| Affected | < 2026.2.2 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-mqpw-46fh-299h |
OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval.resolve through an internal privileged gateway client, bypassing the operator.approvals permission check that protects direct RPC calls.
References:
| Field | Detail |
|---|---|
| CVSS | 7.1 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L |
| CWE | CWE-352 (CWE-352: Cross-Site Request Forgery (CSRF)) |
| Affected | <= 2026.1.24-3 |
| Vendor/Product | openclaw / clawdbot |
| Advisory | GHSA-3fqr-4cg8-h96q |
OpenClaw is a personal AI assistant. Prior to 2026.2.14, browser-facing localhost mutation routes accepted cross-origin browser requests without explicit Origin/Referer validation. Loopback binding reduces remote exposure but does not prevent browser-initiated requests from malicious origins. A malicious website can trigger unauthorized state changes against a victim's local OpenClaw browser control plane (for example opening tabs, starting/stopping the browser, mutating storage/cookies) if the browser control service is reachable on loopback in the victim's browser context. Starting in version 2026.2.14, mutating HTTP methods (POST/PUT/PATCH/DELETE) are rejected when the request indicates a non-loopback Origin/Referer (or Sec-Fetch-Site: cross-site). Other mitigations include enabling browser control auth (token/password) and avoid running with auth disabled.
Naming note: Uses old name
openclaw/clawdbotas vendor/product. References:
| Field | Detail |
|---|---|
| CVSS | 7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-451 (CWE-451: User Interface (UI) Misrepresentation of Critical Information) |
| Affected | < >= 2026.2.6-0, < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-7q2j-c4q5-rm27 |
OpenClaw is a personal AI assistant. OpenClaw macOS desktop client registers the openclaw:// URL scheme. For openclaw://agent deep links without an unattended key, the app shows a confirmation dialog that previously displayed only the first 240 characters of the message, but executed the full message after the user clicked "Run." At the time of writing, the OpenClaw macOS desktop client is still in beta. In versions 2026.2.6 through 2026.2.13, an attacker could pad the message with whitespace to push a malicious payload outside the visible preview, increasing the chance a user approves a different message than the one that is actually executed. If a user runs the deep link, the agent may perform actions that can lead to arbitrary command execution depending on the user's configured tool approvals/allowlists. This is a social-engineering mediated vulnerability: the confirmation prompt could be made to misrepresent the executed message. The issue is fixed in 2026.2.14. Other mitigations include not approve unexpected "Run OpenClaw agent?" prompts triggered while browsing untrusted sites and usingunattended deep links only with a valid key for trusted personal automations.
References:
| Field | Detail |
|---|---|
| CVSS | 7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-cv7m-c9jx-vg7q |
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, authenticated attackers can read arbitrary files from the Gateway host by supplying absolute paths or path traversal sequences to the browser tool's upload action. The server passed these paths to Playwright's setInputFiles() APIs without restricting them to a safe root. An attacker must reach the Gateway HTTP surface (or otherwise invoke the same browser control hook endpoints); present valid Gateway auth (bearer token / password), as required by the Gateway configuration (In common default setups, the Gateway binds to loopback and the onboarding wizard generates a gateway token even for loopback); and have the browser tool permitted by tool policy for the target session/context (and have browser support enabled). If an operator exposes the Gateway beyond loopback (LAN/tailnet/custom bind, reverse proxy, tunnels, etc.), the impact increases accordingly. Starting in version 2026.2.14, the upload paths are now confined to OpenClaw's temp uploads root (DEFAULT_UPLOAD_DIR) and traversal/escape paths are rejected.
References:
| Field | Detail |
|---|---|
| CVSS | 7.1 (HIGH) — CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-345 (CWE-345: Insufficient Verification of Data Authenticity) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-pv58-549p-qh99 |
OpenClaw is a personal AI assistant. Discovery beacons (Bonjour/mDNS and DNS-SD) include TXT records such as lanHost, tailnetDns, gatewayPort, and gatewayTlsSha256. TXT records are unauthenticated. Prior to version 2026.2.14, some clients treated TXT values as authoritative routing/pinning inputs. iOS and macOS used TXT-provided host hints (lanHost/tailnetDns) and ports (gatewayPort) to build the connection URL. iOS and Android allowed the discovery-provided TLS fingerprint (gatewayTlsSha256) to override a previously stored TLS pin. On a shared/untrusted LAN, an attacker could advertise a rogue _openclaw-gw._tcp service. This could cause a client to connect to an attacker-controlled endpoint and/or accept an attacker certificate, potentially exfiltrating Gateway credentials (auth.token / auth.password) during connection. As of time of publication, the iOS and Android apps are alpha/not broadly shipped (no public App Store / Play Store release). Practical impact is primarily limited to developers/testers running those builds, plus any other shipped clients relying on discovery on a shared/untrusted LAN. Version 2026.2.14 fixes the issue. Clients now prefer the resolved service endpoint (SRV + A/AAAA) over TXT-provided routing hints. Discovery-provided fingerprints no longer override stored TLS pins. In iOS/Android, first-time TLS pins require explicit user confirmation (fingerprint shown; no silent TOFU) and discovery-based direct connects are TLS-only. In Android, hostname verification is no longer globally disabled (only bypassed when pinning).
References:
| Field | Detail |
|---|---|
| CVSS | 7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-73 (External Control of File Name or Path) |
| Affected | < 2026.2.12 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-64qx-vpxx-mvqf |
OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service.
References:
| Field | Detail |
|---|---|
| CVSS | 7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.2.1 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-qrq5-wjgg-rvqw |
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing path traversal sequences like .. to write files outside the intended installation directory when victims run the plugins install command.
References:
| Field | Detail |
|---|---|
| CVSS | 6.9 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-522 (CWE-522: Insufficiently Protected Credentials) |
| Affected | < 2026.2.15 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-chf7-jq6g-qrwv |
OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error messages and stack traces (for example, when request URLs include https://api.telegram.org/bot<token>/...). Prior to version 2026.2.15, OpenClaw logged these strings without redaction, which could leak the bot token into logs, crash reports, CI output, or support bundles. Disclosure of a Telegram bot token allows an attacker to impersonate the bot and take over Bot API access. Users should upgrade to version 2026.2.15 to obtain a fix and rotate the Telegram bot token if it may have been exposed.
References:
| Field | Detail |
|---|---|
| CVSS | 6.9 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-209 (CWE-209: Generation of Error Message Containing Sensitive Information), CWE-346 (CWE-346: Origin Validation Error) |
| Affected | < 2026.2.15 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-6hf3-mhgc-cm65 |
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, in some shared-agent deployments, OpenClaw session tools (sessions_list, sessions_history, sessions_send) allowed broader session targeting than some operators intended. This is primarily a configuration/visibility-scoping issue in multi-user environments where peers are not equally trusted. In Telegram webhook mode, monitor startup also did not fall back to per-account webhookSecret when only the account-level secret was configured. In shared-agent, multi-user, less-trusted environments: session-tool access could expose transcript content across peer sessions. In single-agent or trusted environments, practical impact is limited. In Telegram webhook mode, account-level secret wiring could be missed unless an explicit monitor webhook secret override was provided. Version 2026.2.15 fixes the issue.
References:
| Field | Detail |
|---|---|
| CVSS | 6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:L |
| CWE | CWE-918 (CWE-918: Server-Side Request Forgery (SSRF)) |
| Affected | < 2026.2.19 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-w45g-5746-x9fp |
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/gateway/server-cron.ts uses fetch() directly, so webhook targets can reach private/metadata/internal endpoints without SSRF policy checks. This issue was fixed in version 2026.2.19.
References:
| Field | Detail |
|---|---|
| CVSS | 6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-770 (Allocation of Resources Without Limits or Throttling) |
| Affected | < 2026.2.15 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-p536-vvpp-9mc8 |
OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability in the web_fetch tool that allows attackers to crash the Gateway process through memory exhaustion by parsing oversized or deeply nested HTML responses. Remote attackers can social-engineer users into fetching malicious URLs with pathological HTML structures to exhaust server memory and cause service unavailability.
References:
| Field | Detail |
|---|---|
| CVSS | 6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L |
| CWE | CWE-918 (Server-Side Request Forgery (SSRF)) |
| Affected | < 2026.2.2 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-wfp2-v9c7-fh79 |
OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlled sendAttachment or auto-reply mechanisms can trigger SSRF to internal resources and exfiltrate fetched response bytes as outbound attachments.
References:
| Field | Detail |
|---|---|
| CVSS | 6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-290 (Authentication Bypass by Spoofing) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-mj5r-hh7j-4gxf |
OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerability where Telegram allowlist matching accepts mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identity by obtaining recycled usernames to bypass allowlist restrictions and interact with bots as unauthorized senders.
References:
| Field | Detail |
|---|---|
| CVSS | 6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-73 (CWE-73: External Control of File Name or Path) |
| Affected | < 2026.2.15 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-h7f7-89mm-pqh6 |
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a bug in download skill installation allowed targetDir values from skill frontmatter to resolve outside the per-skill tools directory if not strictly validated. In the admin-only skills.install flow, this could write files outside the intended install sandbox. Version 2026.2.15 contains a fix for the issue.
References:
| Field | Detail |
|---|---|
| CVSS | 6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-v892-hwpg-jwqp |
OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a path traversal vulnerability in archive extraction during installation commands that allows arbitrary file writes outside the intended directory. Attackers can craft malicious archives that, when extracted via skills install, hooks install, plugins install, or signal install commands, write files to arbitrary locations enabling persistence or code execution.
References:
| Field | Detail |
|---|---|
| CVSS | 6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-770 (Allocation of Resources Without Limits or Throttling) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-w2cg-vxx6-5xjg |
OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service.
References:
| Field | Detail |
|---|---|
| CVSS | 6.7 (MEDIUM) — CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CWE | CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < >= 2026.1.12, < 2026.2.13 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-xwjm-j929-xq7c |
OpenClaw is a personal AI assistant. In versions 2026.1.12 through 2026.2.12, OpenClaw browser download helpers accepted an unsanitized output path. When invoked via the browser control gateway routes, this allowed path traversal to write downloads outside the intended OpenClaw temp downloads directory. This issue is not exposed via the AI agent tool schema (no download action). Exploitation requires authenticated CLI access or an authenticated gateway RPC token. Version 2026.2.13 fixes the issue.
References:
| Field | Detail |
|---|---|
| CVSS | 6.7 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
| CWE | CWE-770 (Allocation of Resources Without Limits or Throttling) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-h89v-j3x9-8wqj |
OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can trigger resource exhaustion by providing maliciously crafted archive files during install or update operations, causing service degradation or system unavailability.
References:
| Field | Detail |
|---|---|
| CVSS | 6.5 (MEDIUM) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| CWE | CWE-200 (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor), CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.1.30 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-r8g4-86fx-92mq |
OpenClaw is a personal AI assistant. Prior to version 2026.1.30, the isValidMedia() function in src/media/parse.ts allows arbitrary file paths including absolute paths, home directory paths, and directory traversal sequences. An agent can read any file on the system by outputting MEDIA:/path/to/file, exfiltrating sensitive data to the user/channel. This issue has been patched in version 2026.1.30.
| Field | Detail |
|---|---|
| CVSS | 6.5 (MEDIUM) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
| CWE | CWE-284 (CWE-284: Improper Access Control), CWE-863 (CWE-863: Incorrect Authorization) |
| Affected | <= 2026.1.24-3 |
| Vendor/Product | openclaw / clawdbot |
| Advisory | GHSA-g34w-4xqq-h79m |
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, under iMessage groupPolicy=allowlist, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts. Version 2026.2.14 fixes the issue.
Naming note: Uses old name
openclaw/clawdbotas vendor/product. References:
| Field | Detail |
|---|---|
| CVSS | 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-285 (Improper Authorization) |
| Affected | < 2026.2.1 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-33rq-m5x2-fvgf |
OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a vulnerability in the Twitch plugin (must be installed and enabled) in which it fails to enforce the allowFrom allowlist when allowedRoles is unset or empty, allowing unauthorized Twitch users to trigger agent dispatch. Remote attackers can mention the bot in Twitch chat to bypass access control and invoke the agent pipeline, potentially causing unintended actions or resource exhaustion.
References:
| Field | Detail |
|---|---|
| CVSS | 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-1327 (Binding to an Unrestricted IP Address) |
| Affected | < 2026.2.12 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-qw99-grcx-4pvm |
OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper network binding vulnerability in the Chrome extension (must be installed and enabled) relay server that treats wildcard hosts as loopback addresses, allowing the relay HTTP/WS server to bind to all interfaces when a wildcard cdpUrl is configured. Remote attackers can access relay HTTP endpoints off-host to leak service presence and port information, or conduct denial-of-service and brute-force attacks against the relay token header.
References:
| Field | Detail |
|---|---|
| CVSS | 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L |
| CWE | CWE-918 (Server-Side Request Forgery (SSRF)) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-x22m-j5qq-j49m |
OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image processing. Attackers can influence tool calls through direct manipulation or prompt injection to trigger requests to internal services and re-upload responses as Feishu media.
References:
| Field | Detail |
|---|---|
| CVSS | 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-208 (Observable Timing Discrepancy) |
| Affected | < 2026.2.13 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-47q7-97xp-m272 |
OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually recover the authentication token.
References:
| Field | Detail |
|---|---|
| CVSS | 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-287 (Improper Authentication) |
| Affected | < 2026.2.2 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-rmxw-jxxx-4cpc |
OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.
References:
| Field | Detail |
|---|---|
| CVSS | 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-306 (Missing Authentication for Critical Function) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-c37p-4qqg-3p76 |
OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification bypass in the voice-call extension that allows unauthenticated requests when the tunnel.allowNgrokFreeTierLoopbackBypass option is explicitly enabled. An external attacker can send forged requests to the publicly reachable webhook endpoint without a valid X-Twilio-Signature header, resulting in unauthorized webhook event handling and potential request flooding attacks.
References:
| Field | Detail |
|---|---|
| CVSS | 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L |
| CWE | CWE-918 (Server-Side Request Forgery (SSRF)) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-pg2v-8xwh-qhcc |
OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the configured Urbit URL can induce the gateway to make HTTP requests to arbitrary hosts including internal addresses.
References:
| Field | Detail |
|---|---|
| CVSS | 5.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-352 (Cross-Site Request Forgery (CSRF)) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-7rcp-mxpq-72pj |
OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.
References:
| Field | Detail |
|---|---|
| CVSS | 5.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-201 (Insertion of Sensitive Information Into Sent Data) |
| Affected | < 0 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-7vwx-582j-j332 |
OpenClaw versions 2026.1.30 and earlier, contain an information disclosure vulnerability, patched in 2026.2.1, in the MS Teams attachment downloader (optional extension must be enabled) that leaks bearer tokens to allowlisted suffix domains. When retrying downloads after receiving 401 or 403 responses, the application sends Authorization bearer tokens to untrusted hosts matching the permissive suffix-based allowlist, enabling token theft.
References:
| Field | Detail |
|---|---|
| CVSS | 5.8 (MEDIUM) — CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N |
| CWE | CWE-79 (CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')) |
| Affected | < 2026.2.15 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-37gc-85xm-2ww6 |
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a atored XSS issue in the OpenClaw Control UI when rendering assistant identity (name/avatar) into an inline <script> tag without script-context-safe escaping. A crafted value containing </script> could break out of the script tag and execute attacker-controlled JavaScript in the Control UI origin. Version 2026.2.15 removed inline script injection and serve bootstrap config from a JSON endpoint and added a restrictive Content Security Policy for the Control UI (script-src 'self', no inline scripts).
References:
| Field | Detail |
|---|---|
| CVSS | 5.6 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')) |
| Affected | < 2026.2.14 |
| Vendor/Product | OpenClaw / OpenClaw |
| Advisory | GHSA-xw4p-pw82-hqr7 |
OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences like ../ or absolute paths in the name field can write files outside the sandbox workspace root directory.
References:
| Field | Detail |
|---|---|
| CVSS | 5.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-200 (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-8mh7-phf8-xgfm |
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, skills.status could disclose secrets to operator.read clients by returning raw resolved config values in configChecks for skill requires.config paths. Version 2026.2.14 stops including raw resolved config values in requirement checks (return only { path, satisfied }) and narrows the Discord skill requirement to the token key. In addition to upgrading, users should rotate any Discord tokens that may have been exposed to read-scoped clients.
References:
| Field | Detail |
|---|---|
| CVSS | 4.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-1254 (CWE-1254: Incorrect Comparison Logic Granularity) |
| Affected | < 2026.2.15 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-xxvh-5hwj-42pp |
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, normalizeForHash in src/agents/sandbox/config-hash.ts recursively sorted arrays that contained only primitive values. This made order-sensitive sandbox configuration arrays hash to the same value even when order changed. In OpenClaw sandbox flows, this hash is used to decide whether existing sandbox containers should be recreated. As a result, order-only config changes (for example Docker dns and binds array order) could be treated as unchanged and stale containers could be reused. This is a configuration integrity issue affecting sandbox recreation behavior. Starting in version 2026.2.15, array ordering is preserved during hash normalization; only object key ordering remains normalized for deterministic hashing.
References:
| Field | Detail |
|---|---|
| CVSS | 4.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-400 (CWE-400: Uncontrolled Resource Consumption) |
| Affected | < 2026.2.19 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-cxpw-2g23-2vgw |
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very large prompt text blocks and can assemble oversized prompt payloads before forwarding them to chat.send. Because ACP runs over local stdio, this mainly affects local ACP clients (for example IDE integrations) that send unusually large inputs. This issue has been fixed in version 2026.2.19.
References:
| Field | Detail |
|---|---|
| CVSS | 4.6 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
| CWE | CWE-61 (CWE-61: UNIX Symbolic Link (Symlink) Following) |
| Affected | < 2026.2.19 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-r6h2-5gqq-v5v6 |
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, skills/skill-creator/scripts/package_skill.py (a local helper script used when authors package skills) previously followed symlinks while building .skill archives. If an author runs this script on a crafted local skill directory containing symlinks to files outside the skill root, the resulting archive can include unintended file contents. If exploited, this vulnerability can lead to potential unintentional disclosure of local files from the packaging machine into a generated .skill artifact, but requires local execution of the packaging script on attacker-controlled skill contents. This issue has been fixed in version 2026.2.18.
References:
| Field | Detail |
|---|---|
| CVSS | 4.3 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H |
| CWE | CWE-283 (CWE-283: Unverified Ownership) |
| Affected | < 2026.2.14 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-jfv4-h8mc-jcp8 |
OpenClaw is a personal AI assistant. In versions 2026.2.13 and below of the OpenClaw CLI, the process cleanup uses system-wide process enumeration and pattern matching to terminate processes without verifying if they are owned by the current OpenClaw process. On shared hosts, unrelated processes can be terminated if they match the pattern. The CLI runner cleanup helpers can kill processes matched by command-line patterns without validating process ownership. This issue has been fixed in version 2026.2.14.
References:
| Field | Detail |
|---|---|
| CVSS | 3.7 (LOW) — CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N |
| CWE | CWE-74 (CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')), CWE-94 (CWE-94: Improper Control of Generation of Code ('Code Injection')) |
| Affected | < 2026.2.3 |
| Vendor/Product | clawdbot / clawdbot |
| Advisory | GHSA-782p-5fr5-7fj8 |
OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions 2026.2.2 and below, when the Slack integration is enabled, channel metadata (topic/description) can be incorporated into the model's system prompt. Prompt injection is a documented risk for LLM-driven systems. This issue increases the injection surface by allowing untrusted Slack channel metadata to be treated as higher-trust system input. This issue has been fixed in version 2026.2.3.
Naming note: Uses old name
clawdbot/clawdbotas vendor/product. References:
| Field | Detail |
|---|---|
| CVSS | 2.3 (LOW) — CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
| CWE | CWE-862 (CWE-862: Missing Authorization) |
| Affected | < 2026.2.18 |
| Vendor/Product | openclaw / openclaw |
| Advisory | GHSA-wh94-p5m6-mr7j |
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action handling (timeout, kick, ban) uses sender identity from request parameters in tool-driven flows, instead of trusted runtime sender context. In setups where Discord moderation actions are enabled and the bot has the necessary guild permissions, a non-admin user can request moderation actions by spoofing sender identity fields. This issue has been fixed in version 2026.2.18.
References:
Of 11 GHSAs with CVE IDs, 11 are fully published and 0 remain RESERVED.
| CVE ID | State | cvelistV5 | GHSA Published | CNA |
|---|---|---|---|---|
| CVE-2026-24763 | ✅ PUBLISHED | ✅ | 2026-02-02 | GitHub_M |
| CVE-2026-25157 | ✅ PUBLISHED | ✅ | 2026-02-02 | GitHub_M |
| CVE-2026-25253 | ✅ PUBLISHED | ✅ | 2026-02-02 | mitre |
| CVE-2026-26317 | ✅ PUBLISHED | ✅ | 2026-02-18 | GitHub_M |
| CVE-2026-26328 | ✅ PUBLISHED | ✅ | 2026-02-18 | GitHub_M |
| CVE-2026-28452 | ✅ PUBLISHED | ✅ | 2026-02-18 | VulnCheck |
| CVE-2026-28458 | ✅ PUBLISHED | ✅ | 2026-02-17 | VulnCheck |
| CVE-2026-28469 | ✅ PUBLISHED | ✅ | 2026-02-18 | VulnCheck |
| CVE-2026-28478 | ✅ PUBLISHED | ✅ | 2026-02-18 | VulnCheck |
| CVE-2026-28480 | ✅ PUBLISHED | ✅ | 2026-02-18 | VulnCheck |
| CVE-2026-29612 | ✅ PUBLISHED | ✅ | 2026-02-18 | VulnCheck |
| Insight | Detail |
|---|---|
| Dominant Weakness | 52% of categorized issues relate to Allowlist Bypass (67/130) |
| V5 Sync Rate | 11/11 CVE IDs (100%) have full cvelistV5 records |
| Advisory Velocity | 158 security advisories across 2026-02-02 → 2026-03-09 |
| Top Severity | 0 Critical + 51 High = 51 high-impact issues (32%) |
| Category | Count | Examples |
|---|---|---|
| OS Command Injection (CWE-78) | 12 | PATH injection, SSH command injection, Docker exec, keychain writes |
| Path Traversal (CWE-22) | 8 | MEDIA: paths, plugin install, browser downloads, Zip Slip, transcript paths |
| SSRF | 5 | Image tool fetch, Feishu extension, attachment/media URLs, IPv6 bypass |
| Auth Bypass / Missing Auth | 11 | WebSocket config.apply, webhook verification, browser relay, sandbox bridge |
| Allowlist Bypass | 67 | Telegram usernames, Matrix displayName, Slack DM, Twitch, voice-call |
| Injection (XSS/CSRF/Prompt) | 21 | XSS in Control UI, prompt injection via Slack/CWD/logs, CSRF |
| Denial of Service | 6 | Unbounded media fetch, webhook body buffering, archive expansion |
| GHSA | CVE | Severity | Title | Published |
|---|---|---|---|---|
| GHSA-6mgf-v5j7-45cr | — | OpenClaw: fetch-guard forwards custom authorization headers across cross-origin redirects | 2026-03-09 | |
| GHSA-rchv-x836-w7xp | — | OpenClaw's dashboard leaked gateway auth material via browser URL/query and localStorage | 2026-03-09 | |
| GHSA-3jx4-q2m7-r496 | — | OpenClaw: Hardlink alias checks could bypass workspace-only file boundaries in specific configurations | 2026-03-04 | |
| GHSA-vvjh-f6p9-5vcf | — | OpenClaw Canvas Authentication Bypass Vulnerability | 2026-03-04 | |
| GHSA-x2ff-j5c2-ggpr | — | OpenClaw: Slack interactive callbacks could skip configured sender checks in some shared-workspace flows | 2026-03-04 | |
| GHSA-2ch6-x3g4-7759 | — | OpenClaw's commands.allowFrom sender authorization accepted conversation identifiers via ctx.From | 2026-03-03 | |
| GHSA-jj82-76v6-933r | — | OpenClaw's exec allowlist wrapper analysis did not unwrap env/shell dispatch chains | 2026-03-03 | |
| GHSA-m8v2-6wwh-r4gc | — | OpenClaw's sandbox bind validation could bypass allowed-root and blocked-path checks via symlink-parent missing-leaf paths | 2026-03-03 | |
| GHSA-jxrq-8fm4-9p58 | — | OpenClaw: Zip extraction symlink traversal could write outside destination | 2026-03-03 | |
| GHSA-659f-22xc-98f2 | — | OpenClaw hook transform path containment missed symlink-resolved escapes | 2026-03-03 | |
| GHSA-4gc7-qcvf-38wg | — | In OpenClaw, manually adding sort to tools.exec.safeBins could bypass allowlist approval via --compress-program | 2026-03-03 | |
| GHSA-w7j5-j98m-w679 | — | OpenClaw has multiple E2E/test Dockerfiles that run all processes as root | 2026-03-03 | |
| GHSA-7ff8-xjh3-mgh6 | — | OpenClaw's non-default autoAllowSkills setting could bypass on-miss exec prompt | 2026-03-03 | |
| GHSA-xgf2-vxv2-rrmg | — | OpenClaw's shell startup env injection bypasses system.run allowlist intent (RCE class) | 2026-03-03 | |
| GHSA-w9cg-v44m-4qv8 | — | OpenClaw affected by BASH_ENV / ENV startup-file injection into spawned shell commands | 2026-03-03 | |
| GHSA-xmv6-r34m-62p4 | — | OpenClaw: Sandbox media fallback tmp symlink alias bypass allows host file reads outside sandboxRoot | 2026-03-03 | |
| GHSA-g75x-8qqm-2vxp | — | OpenClaw's tools.exec.safeBins PATH-hijack allowed trojan binaries to bypass allowlist checks | 2026-03-03 | |
| GHSA-vffc-f7r7-rx2w | — | OpenClaw Improperly Neutralizes Line Breaks in systemd Unit Generation Enables Local Command Execution (Linux) | 2026-03-03 | |
| GHSA-pj5x-38rw-6fph | — | OpenClaw has a Command Injection via unescaped environment assignments in Windows Scheduled Task script generation | 2026-03-03 | |
| GHSA-3c6h-g97w-fg78 | — | OpenClaw's tools.exec.safeBins sort long-option abbreviation bypass can skip exec approval in allowlist mode | 2026-03-03 | |
| GHSA-mqr9-vqhq-3jxw | — | OpenClaw Windows Scheduled Task script generation allowed local command injection via unsafe cmd argument handling | 2026-03-03 | |
| GHSA-p4wh-cr8m-gm6c | — | OpenClaw: shell-env trusted-prefix fallback allowed attacker-controlled binary execution via $SHELL | 2026-03-03 | |
| GHSA-5gj7-jf77-q2q2 | — | OpenClaw: safeBins static default trusted dirs allow writable-dir binary hijack (jq) | 2026-03-03 | |
| GHSA-474h-prjg-mmw3 | — | OpenClaw: Sandboxed sessions_spawn(runtime="acp") bypassed sandbox inheritance and allowed host ACP initialization | 2026-03-03 | |
| GHSA-r54r-wmmq-mh84 | — | OpenClaw: ZIP extraction race could write outside destination via parent symlink rebind | 2026-03-03 | |
| GHSA-8mvx-p2r9-r375 | — | OpenClaw's web tools strict URL guard could lose DNS pinning when env proxy is configured | 2026-03-03 | |
| GHSA-cfvj-7rx7-fc7c | — | OpenClaw: stageSandboxMedia destination symlink traversal can overwrite files outside sandbox workspace | 2026-03-03 | |
| GHSA-x9cf-3w63-rpq9 | — | OpenClaw vulnerable to sensitive file disclosure via stageSandboxMedia | 2026-03-03 | |
| GHSA-8fmp-37rc-p5g7 | — | OpenClaw's config env vars allowed startup env injection into service runtime | 2026-03-03 | |
| GHSA-6rcp-vxwf-3mfp | — | OpenClaw's system.run shell-wrapper positional argv carriers could execute hidden commands under misleading approval text | 2026-03-03 | |
| GHSA-mwcg-wfq3-4gjc | — | OpenClaw's system.run approval TOCTOU via mutable symlink cwd target on node host | 2026-03-03 | |
| GHSA-rq6g-px6m-c248 | CVE-2026-28469 | OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting | 2026-02-18 | |
| GHSA-3fqr-4cg8-h96q | CVE-2026-26317 | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | 2026-02-18 | |
| GHSA-q447-rj3r-2cgh | CVE-2026-28478 | OpenClaw affected by denial of service via unbounded webhook request body buffering | 2026-02-18 | |
| GHSA-mr32-vwc2-5j6h | CVE-2026-28458 | OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access | 2026-02-17 | |
| GHSA-q284-4pvr-m585 | CVE-2026-25157 | OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand | 2026-02-02 | |
| GHSA-g8p2-7wf7-98mq | CVE-2026-25253 | OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl | 2026-02-02 | |
| GHSA-mc68-q9jw-2h3v | CVE-2026-24763 | OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable | 2026-02-02 | |
| GHSA-r2c6-8jc8-g32w | — | Duplicate Advisory: 1-Click RCE via Authentication Token Exfiltration From gatewayUrl | 2026-02-02 |
| GHSA | CVE | Severity | Title | Published |
|---|---|---|---|---|
| GHSA-9q36-67vc-rrwg | — | OpenClaw: Sandboxed /acp spawn requests could initialize host ACP sessions | 2026-03-09 | |
| GHSA-9q2p-vc84-2rwm | — | OpenClaw: system.run allow-always persistence included shell-commented payload tails | 2026-03-09 | |
| GHSA-hfpr-jhpq-x4rm | — | OpenClaw: operator.write chat.send could reach admin-only config writes | 2026-03-09 | |
| GHSA-r6qf-8968-wj9q | — | OpenClaw: system.run wrapper-depth boundary could skip shell approval gating | 2026-03-09 | |
| GHSA-pjvx-rx66-r3fg | — | OpenClaw: Cross-account sender authorization expansion in /allowlist ... --store account scoping | 2026-03-09 | |
| GHSA-3h2q-j2v4-6w5r | — | OpenClaw's system.run allowlist approval parsing missed PowerShell encoded-command wrappers | 2026-03-09 | |
| GHSA-j425-whc4-4jgc | — | OpenClaw's system.run env override filtering allowed dangerous helper-command pivots | 2026-03-09 | |
| GHSA-6rmx-gvvg-vh6j | — | OpenClaw's hooks count non-POST requests toward auth lockout | 2026-03-09 | |
| GHSA-jwf4-8wf4-jf2m | — | OpenClaw: BlueBubbles (optional plugin) pairing/allowlist mismatch when allowFrom is empty | 2026-03-04 | |
| GHSA-jjgj-cpp9-cvpv | — | OpenClaw Vulnerable to Local File Exfiltration via MCP Tool Result MEDIA: Directive Injection | 2026-03-04 | |
| GHSA-q6qf-4p5j-r25g | — | OpenClaw's image tool bypasses tools.fs.workspaceOnly on sandbox mount paths and exfiltrates out-of-workspace images | 2026-03-04 | |
| GHSA-4rqq-w8v4-7p47 | — | OpenClaw has incomplete IPv4 special-use SSRF blocking in web fetch guard | 2026-03-04 | |
| GHSA-9mph-4f7v-fmvh | — | OpenClaw has agent avatar symlink traversal in gateway session metadata | 2026-03-04 | |
| GHSA-f6h3-846h-2r8w | — | OpenClaw's elevated allowFrom accepted broader identity signals than specified within sender-scoped authorization | 2026-03-04 | |
| GHSA-8cp7-rp8r-mg77 | — | OpenClaw has SSRF guard bypass via IPv6 transition over ISATAP | 2026-03-04 | |
| GHSA-gq83-8q7q-9hfx | — | OpenClaw's serialize sandbox registry writes to prevent races and delete-rollback corruption | 2026-03-03 | |
| GHSA-rv2q-f2h5-6xmg | — | OpenClaw's Node role device-identity bypass allows unauthorized node.event injection | 2026-03-03 | |
| GHSA-fg3m-vhrr-8gj6 | — | OpenClaw has Windows Lobster shell fallback command injection in constrained fallback path | 2026-03-03 | |
| GHSA-534w-2vm4-89xr | — | OpenClaw's Zalo group sender allowlist bypass permits unauthorized GROUP dispatch | 2026-03-03 | |
| GHSA-cjv3-m589-v3rx | — | OpenClaw has Canvas route hardening for mixed-trust deployments | 2026-03-03 | |
| GHSA-wpph-cjgr-7c39 | — | OpenClaw's typed sender-key matching for toolsBySender prevents identity-collision policy bypass | 2026-03-03 | |
| GHSA-792q-qw95-f446 | — | OpenClaw's Signal reaction-only status events could, in limited cases, be enqueued before access checks | 2026-03-03 | |
| GHSA-r9q5-c7qc-p26w | — | OpenClaw's Nextcloud Talk webhook replay could trigger duplicate inbound processing | 2026-03-03 | |
| GHSA-gw85-xp4q-5gp9 | — | OpenClaw's Synology Chat dmPolicy=allowlist failed open on empty allowedUserIds, allowing unauthorized agent dispatch | 2026-03-03 | |
| GHSA-25pw-4h6w-qwvm | — | OpenClaw has a BlueBubbles group allowlist mismatch via DM pairing-store fallback | 2026-03-03 | |
| GHSA-796m-2973-wc5q | — | OpenClaw has exec allowlist/safeBins policy-runtime mismatch via env -S wrapper interpretation | 2026-03-03 | |
| GHSA-jmmg-jqc7-5qf4 | — | OpenClaw's browser-origin WebSocket auth hardening gap could enable loopback password brute-force chains | 2026-03-03 | |
| GHSA-2rgf-hm63-5qph | — | OpenClaw improperly parses X-Forwarded-For behind trusted proxies allows client IP spoofing in security decisions | 2026-03-03 | |
| GHSA-27cr-4p5m-74rj | — | OpenClaw has a workspace-only sandbox guard mismatch for @-prefixed absolute paths | 2026-03-03 | |
| GHSA-r294-2894-92j3 | — | OpenClaw has stored XSS in exported session HTML viewer via markdown/raw-HTML rendering | 2026-03-03 | |
| GHSA-v3j7-34xh-6g3w | — | OpenClaw Loopback CDP probe can leak Gateway token to local listener | 2026-03-03 | |
| GHSA-4cqv-h74h-93j4 | — | OpenClaw has a Discord allowFrom slug-collision authorization bypass | 2026-03-03 | |
| GHSA-3cvx-236h-m9fj | — | OpenClaw has an opt-in insecure Control UI auth over plaintext HTTP could allow privileged access | 2026-03-03 | |
| GHSA-h97f-6pqj-q452 | — | OpenClaw has a IPv6 multicast SSRF classifier bypass | 2026-03-03 | |
| GHSA-3x3x-h76w-hp98 | — | OpenClaw exec allowlist safeBins short-option bypass could permit arbitrary file write | 2026-03-03 | |
| GHSA-pfv7-rr5m-qmv6 | — | OpenClaw has auth inconsistency on local Browser Extension Relay /extension endpoint | 2026-03-03 | |
| GHSA-j4xf-96qf-rx69 | — | OpenClaw has a Feishu allowFrom authorization bypass via display-name collision | 2026-03-03 | |
| GHSA-9p38-94jf-hgjj | — | OpenClaw has macOS system.run allowlist bypass via quoted command substitution | 2026-03-03 | |
| GHSA-5h2c-8v84-qpvr | — | OpenClaw shell-env fallback trusted startup env and could execute attacker-influenced login-shell paths | 2026-03-03 | |
| GHSA-ff98-w8hj-qrxf | — | OpenClaw plugin runtime command execution is part of trusted plugin boundary | 2026-03-03 | |
| GHSA-553v-f69r-656j | — | OpenClaw unpaired device identity can bypass operator pairing and self-assign operator scopes with shared auth | 2026-03-03 | |
| GHSA-45cg-2683-gfmq | — | OpenClaw browser navigation guard allowed non-network URL schemes, enabling authenticated browser-tool users to access file:// local files | 2026-03-03 | |
| GHSA-h9xm-j4qg-fvpg | — | OpenClaw: Experimental apply_patch may bypass workspace-only checks in opt-in sandbox mounts (off by default) | 2026-03-03 | |
| GHSA-j26j-7qc4-3mrf | — | OpenClaw: MS Teams fileConsent/invoke missing conversation binding allowed cross-conversation pending-upload consumption | 2026-03-03 | |
| GHSA-2hm8-rqrm-xfjq | — | OpenClaw's owner-only gateway tool access checks were incomplete in specific authenticated DM flows | 2026-03-03 | |
| GHSA-2mc2-g238-722j | — | OpenClaw affected by iMessage remote attachment SCP hardening (strict host-key checks and remoteHost validation) | 2026-03-03 | |
| GHSA-77hf-7fqf-f227 | — | OpenClaw skills-install-download: tar.bz2 extraction bypassed archive safety parity checks (local DoS) | 2026-03-03 | |
| GHSA-wpg9-4g4v-f9rc | — | OpenClaw: Discord voice transcript owner-flag omission could expose owner-only tools in mixed-trust channels | 2026-03-03 | |
| GHSA-v865-p3gq-hw6m | — | OpenClaw has encoded-path auth bypass in plugin /api/channels route classification | 2026-03-03 | |
| GHSA-354r-7mfh-7rh2 | — | OpenClaw: Discord DM reaction ingress missed dmPolicy/allowFrom checks in restricted setups | 2026-03-03 | |
| GHSA-3pxq-f3cp-jmxp | — | OpenClaw: Unified root-bound write hardening for browser output and related path-boundary flows | 2026-03-03 | |
| GHSA-h3rm-6x7g-882f | — | OpenClaw's Node system.run approval hardening wrapper semantic drift can execute unintended local scripts | 2026-03-03 | |
| GHSA-2858-xg23-26fp | — | OpenClaw: Node camera URL payload host-binding bypass allowed gateway fetch pivots | 2026-03-03 | |
| GHSA-x4vp-4235-65hg | — | OpenClaw has pre-auth webhook body parsing that can enable unauthenticated slow-request DoS | 2026-03-03 | |
| GHSA-56pc-6hvp-4gv4 | — | OpenClaw vulnerable to arbitrary file read via $include directive | 2026-03-03 | |
| GHSA-9868-vxmx-w862 | — | OpenClaw's system.run allowlist bypass via shell line-continuation command substitution | 2026-03-03 | |
| GHSA-f8mp-vj46-cq8v | — | OpenClaw's shell env fallback trusts unvalidated SHELL path from host environment | 2026-03-03 | |
| GHSA-qhrr-grqp-6x2g | — | OpenClaw's tools.exec.safeBins trusted PATH directories allowed binary shadowing in allowlist mode | 2026-03-03 | |
| GHSA-rm2p-j3r7-4x4j | — | OpenClaw's Slack reaction/pin sender-policy consistency issue in non-message ingress | 2026-03-03 | |
| GHSA-25gx-x37c-7pph | — | OpenClaw's andbox browser noVNC observer lacked VNC authentication | 2026-03-03 | |
| GHSA-jv6r-27ww-4gw4 | — | OpenClaw DM pairing-store identities could satisfy group allowlist authorization | 2026-03-03 | |
| GHSA-ccg8-46r6-9qgj | — | OpenClaw's dispatch-wrapper depth-cap mismatch can bypass shell-wrapper approval gating in system.run allowlist mode | 2026-03-03 | |
| GHSA-mj5r-hh7j-4gxf | CVE-2026-28480 | OpenClaw Telegram allowlist authorization accepted mutable usernames | 2026-02-18 | |
| GHSA-h89v-j3x9-8wqj | CVE-2026-28452 | OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) | 2026-02-18 | |
| GHSA-w2cg-vxx6-5xjg | CVE-2026-29612 | OpenClaw: denial of service through large base64 media files allocating large buffers before limit checks | 2026-02-18 | |
| GHSA-g34w-4xqq-h79m | CVE-2026-26328 | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities | 2026-02-18 |
| GHSA | CVE | Severity | Title | Published |
|---|---|---|---|---|
| GHSA-vjp8-wprm-2jw9 | — | OpenClaw has cross-account DM pairing authorization bypass via unscoped pairing store access | 2026-03-04 | |
| GHSA-8mf7-vv8w-hjr2 | — | OpenClaw's tools.exec.safeBins generic fallback allowed interpreter-style inline payload execution in allowlist mode | 2026-03-03 | |
| GHSA-v6x2-2qvm-6gv8 | — | OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback | 2026-03-03 | |
| GHSA-gcj7-r3hg-m7w6 | — | OpenClaw's voice-call Twilio replay dedupe now bound to authenticated webhook identity | 2026-03-03 | |
| GHSA-7qf6-h84j-8fq4 | — | OpenClaw: Microsoft Teams media fetch paths bypass shared SSRF guard model | 2026-03-03 | |
| GHSA-62f6-mrcj-v8h5 | — | OpenClaw's runtime /debug override path accepted prototype-reserved keys | 2026-03-03 | |
| GHSA-vvgp-4c28-m3jm | — | OpenClaw has a Trusted-proxy Control UI pairing bypass which allows unpaired node sessions | 2026-03-03 | |
| GHSA-chm2-m3w2-wcxm | — | OpenClaw Google Chat spoofing access with allowlist authorized mutable email principal despite sender-ID mismatch | 2026-02-17 |
These advisories are listed on the repo security page but not yet indexed in the GitHub Advisory Database. See the full advisory list for details.
| GHSA | Severity | Title | Published |
|---|---|---|---|
| GHSA-6f6j-wx9w-ff4j | ACPX Windows wrapper shell fallback allowed cwd injection in specific paths | 2026-03-02 | |
| GHSA-9f72-qcpw-2hxc | Native prompt image auto-load did not honor tools.fs.workspaceOnly in sandboxed runs | 2026-02-25 | |
| GHSA-gp3q-wpq4-5c5h | LINE group allowlist scope mismatch with DM pairing-store entries | 2026-02-26 | |
| GHSA-hwpq-rrpf-pgcq | system.run approval identity mismatch could execute a different binary than displayed | 2026-02-26 | |
| GHSA-jr6x-2q95-fh2g | Authorization mismatch allowed write-scope agent runs to reach owner-only tools | 2026-03-02 | |
| GHSA-mfg5-7q5g-f37j | voice-call media stream validated streams after upgrade, which could allow pre-start unauthenticated sockets to increase resource pressure | 2026-02-23 | |
| GHSA-mgrq-9f93-wpp5 | workspace path guard bypass on non-existent out-of-root symlink leaf | 2026-02-26 | |
| GHSA-mwxv-35wr-4vvj | Gateway plugin auth bypass via encoded dot-segment traversal in protected /api/channels paths | 2026-02-26 | |
| GHSA-p7gr-f84w-hqg5 | Sandboxed sessions_spawn now enforces sandbox inheritance for cross-agent spawns | 2026-03-02 | |
| GHSA-q399-23r3-hfx4 | system.run approvals did not bind PATH-token executable identity, enabling post-approval executable rebind | 2026-03-02 | |
| GHSA-qcc4-p59m-p54m | Sandbox dangling-symlink alias handling could bypass workspace-only write boundary | 2026-02-26 | |
| GHSA-r65x-2hqr-j5hf | Node reconnect metadata spoofing could bypass platform-based node command policy | 2026-02-26 | |
| GHSA-2ww6-868g-2c56 | HTML injection via unvalidated image MIME type in data-URL interpolation | 2026-02-24 | |
| GHSA-33hm-cq8r-wc49 | Temporary path handling could write outside OpenClaw temp boundary | 2026-02-25 | |
| GHSA-36h3-7c54-j27r | Browser trace/download path symlink escape in temp output handling | 2026-02-26 | |
| GHSA-392f-ggf5-fp3c | Unicode canonicalization drift in node metadata policy classification could broaden node allowlists | 2026-03-02 | |
| GHSA-48wf-g7cp-gr3m | allowlist exec-guard bypass via env -S | 2026-02-24 | |
| GHSA-6x2m-hqfw-hvpj | Node exec approvals could be replayed across nodes | 2026-02-24 | |
| GHSA-7jx5-9fjg-hp4m | ACP permission auto-approval bypass via untrusted tool metadata | 2026-02-24 | |
| GHSA-7xmq-g46g-f8pv | Sandbox media TOCTOU could read files outside sandbox root | 2026-03-02 | |
| GHSA-8g75-q649-6pv6 | system.run approvals did not bind mutable script operands across approval and execution | 2026-03-10 | |
| GHSA-8j2w-6fmm-m587 | /api/channels gateway-auth boundary bypass via path canonicalization mismatch | 2026-02-26 | |
| GHSA-8j9w-9pm5-pv8m | DUPLICATE of GHSA-3c6h-g97w-fg78: safeBins denied flags can be bypassed via GNU long-option abbreviations | 2026-02-24 | |
| GHSA-8m9v-xpgf-g99m | Unauthorized sender bypass in stop triggers and /models command authorization | 2026-03-02 | |
| GHSA-f7ww-2725-qvw2 | Node system.run approval bypass via parent-symlink cwd rebind | 2026-02-26 | |
| GHSA-fgvx-58p6-gjwc | Gateway agents.files symlink escape allowed out-of-workspace file read/write | 2026-02-26 | |
| GHSA-fqcm-97m6-w7rm | Message action attachment hydration bypasses local media root checks when sandboxRoot is unset | 2026-02-25 | |
| GHSA-g7cr-9h7q-4qxq | MS Teams sender allowlist bypass when route allowlist is configured and sender allowlist is empty | 2026-03-11 | |
| GHSA-g99v-8hwm-g76g | web_search citation redirect SSRF via private-network-allowing policy | 2026-03-02 | |
| GHSA-gwqp-86q6-w47g | exec allow-always can be bypassed via unrecognized multiplexer shell wrappers (busybox/toybox sh -c) | 2026-02-24 | |
| GHSA-h656-5vcf-cm23 | Telegram: Unauthorized Senders Trigger Media Download and Disk Write Before Access Check | 2026-02-25 | |
| GHSA-hjvp-qhm6-wrh2 | Node system.run approval context-binding weakness in approval-enabled host=node flows | 2026-02-26 | |
| GHSA-qj22-xqjr-v83v | Telegram message_reaction authorization bypass allows unauthorized system-event injection | 2026-02-26 | |
| GHSA-rx3g-mvc3-qfjf | Avatar symlink traversal can expose out-of-workspace local files | 2026-02-23 | |
| GHSA-v8cg-4474-49v8 | Slack system events bypass sender authorization in member and message subtype handlers | 2026-02-26 | |
| GHSA-vhwf-4x96-vqx2 | skills-install-download can be redirected outside the tools root by rebinding the validated base path | 2026-03-11 | |
| GHSA-vmqr-rc7x-3446 | Non-default safeBins sort configuration can bypass intended allowlist approval constraints | 2026-02-23 | |
| GHSA-vpj2-69hf-rppw | Browser control startup could continue unauthenticated after auth bootstrap failure | 2026-03-02 | |
| GHSA-vqx8-9xxw-f2m7 | voice-call Twilio webhook replay could bypass manager dedupe because normalized event IDs were randomized per parse | 2026-02-24 | |
| GHSA-wr6m-jg37-68xh | Unbounded memory growth in Zalo webhook via query-string key churn (unauthenticated DoS) | 2026-03-02 | |
| GHSA-x82f-27x3-q89c | TOCTOU symlink race in writeFileWithinRoot could create or truncate files outside root boundaries | 2026-03-02 | |
| GHSA-2j9j-gf59-p4p5 | iOS deep link (openclaw://agent) can trigger gateway agent requests without local confirmation | 2026-02-24 | |
| GHSA-6g25-pc82-vfwp | macOS beta onboarding exposed PKCE verifier via OAuth state | 2026-02-26 | |
| GHSA-wm8r-w8pf-2v6w | Signal group allowlist authorization bypass via DM pairing-store leakage | 2026-02-26 | |
| GHSA-ww6v-v748-x7g9 | sandbox network isolation bypass via docker.network=container: | 2026-02-25 |
The OpenClaw project has been renamed multiple times, causing inconsistencies across CVE records:
| CVE | vendor | product | packageURL | Description Names |
|---|---|---|---|---|
| CVE-2026-28363 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28466 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28474 | OpenClaw | nextcloud-talk | pkg:npm/openclaw-nextcloud-talk | OpenClaw |
| CVE-2026-28446 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28391 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28472 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28470 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-24763 | clawdbot | clawdbot | — | OpenClaw (formerly Clawdbot) |
| CVE-2026-25253 | OpenClaw | OpenClaw | pkg:npm/clawdbot | OpenClaw / clawdbot / Moltbot |
| CVE-2026-28462 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28478 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28479 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-29609 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-26323 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27001 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28456 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28463 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28468 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-25593 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28482 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28393 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28453 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28450 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28392 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28454 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28464 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28465 | OpenClaw | voice-call | pkg:npm/openclaw-voice-call | OpenClaw |
| CVE-2026-28469 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-29613 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-29611 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-25157 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27002 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-29610 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-26322 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27487 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-25474 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-26319 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-26321 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-26316 | openclaw | @openclaw/bluebubbles | — | OpenClaw |
| CVE-2026-26324 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28485 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28458 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-26325 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28473 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-26317 | openclaw | clawdbot | — | OpenClaw (formerly Clawdbot) |
| CVE-2026-26320 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-26329 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-26327 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28459 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28447 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-27003 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27004 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27488 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28394 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28467 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28480 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-27008 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28486 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-29612 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-26972 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28452 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-25475 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-26328 | openclaw | clawdbot | — | OpenClaw (formerly Clawdbot) |
| CVE-2026-28448 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28395 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28451 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28475 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28471 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-29606 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28476 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28477 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-28481 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-27009 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-28457 | OpenClaw | OpenClaw | pkg:npm/openclaw | OpenClaw |
| CVE-2026-26326 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27007 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27576 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27485 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-27486 | openclaw | openclaw | — | OpenClaw |
| CVE-2026-24764 | clawdbot | clawdbot | — | OpenClaw (formerly Clawdbot) |
| CVE-2026-27484 | openclaw | openclaw | — | OpenClaw |
| Source | URL |
|---|---|
| CVE List v5 | CVEProject/cvelistV5 |
| GitHub Advisory DB | github.com/advisories |
| Repo Security Tab | openclaw/openclaw/security |
| CVE Services API | https://cveawg.mitre.org/api/cve-id/{CVE-ID} |
Auto-generated by update_readme.py · Updated hourly via GitHub Actions
Data: ghsa-advisories.json · cves.json · cve-pipeline-status.json
Maintained by Jerry Gamblin · OpenClawCVEs