logo
0
0
WeChat Login
github-actions[bot]<41898282+github-actions[bot]@users.noreply.github.com>
chore: update CVE/GHSA tracker [2026-03-11 06:23 UTC]

🛡️ OpenClaw CVE & Security Advisory Tracker

Total Advisories CVEs Assigned CVEs Published Reserved
Critical High Medium Low Awaiting CVE

An automated tracker that continuously monitors OpenClaw security advisories across the GitHub Advisory Database, repo-level security advisories, and the CVE V5 (cvelistV5) registry. Every hour it pulls the latest data, reconciles GHSA → CVE publication state, and regenerates this dashboard so you always have an up-to-date picture of the project's vulnerability landscape.

Last updated: 2026-03-11 06:23 UTC · MIT License · Full Advisory List · Security Policy · Data: cvelistV5 + Advisory DB · Updates hourly


Published CVEs · Pipeline · Advisories · Categories · Insights · Identity


🏗️ Project Identity

FieldValue
Current NameOpenClaw
Previous NamesMoltbot (second name), Clawdbot (original name)
Repositoryopenclaw/openclaw
npm Packageopenclaw (formerly clawdbot)
AuthorPeter Steinberger (steipete)
Search terms for CVE discovery

To find all CVEs, search for: openclaw, clawdbot, moltbot, clawhub, pkg:npm/clawdbot, pkg:npm/openclaw


🚀 CVEs Published in cvelistV5 (11)

These CVEs have full records in the CVEProject/cvelistV5 repository:

CVE IDSeverityCVSSTitleCWEPublished
CVE-2026-28363Critical9.9In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be…CWE-1842026-02-27
CVE-2026-28466Critical9.4OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval BypassCWE-8632026-03-05
CVE-2026-28474Critical9.3OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name SpoofingCWE-8632026-03-05
CVE-2026-28446Critical9.2OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix MatchingCWE-3032026-03-05
CVE-2026-28391Critical9.2OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist EnforcementCWE-1842026-03-05
CVE-2026-28472Critical9.2OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect HandshakeCWE-3062026-03-05
CVE-2026-28470Critical9.2OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double QuotesCWE-882026-03-05
CVE-2026-24763High8.8OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment VariableCWE-782026-02-02
CVE-2026-25253High8.8OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrlCWE-6692026-02-01
CVE-2026-28462High8.7OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output PathsCWE-222026-03-05
CVE-2026-28478High8.7OpenClaw affected by denial of service via unbounded webhook request body bufferingCWE-7702026-03-05
CVE-2026-28479High8.7OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox ConfigurationCWE-3272026-03-05
CVE-2026-29609High8.7OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media FetchCWE-7702026-03-05
CVE-2026-26323High8.6OpenClaw has a command injection in maintainer clawtributors updaterCWE-782026-02-19
CVE-2026-27001High8.6OpenClaw: Unsanitized CWD path injection into LLM promptsCWE-772026-02-19
CVE-2026-28456High8.6OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path HandlingCWE-4272026-03-05
CVE-2026-28463High8.6OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins AllowlistCWE-782026-03-05
CVE-2026-28468High8.5OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge ServerCWE-3062026-03-05
CVE-2026-25593High8.4OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.applyCWE-78, CWE-3062026-02-06
CVE-2026-28482High8.4OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile ParametersCWE-222026-03-05
CVE-2026-28393High8.3OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path TraversalCWE-4272026-03-05
CVE-2026-28453High8.3OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive ExtractionCWE-222026-03-05
CVE-2026-28450High8.3OpenClaw < 2026.2.12 - Unauthenticated Profile Tampering via Nostr Plugin HTTP EndpointsCWE-3062026-03-05
CVE-2026-28392High8.2OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct MessagesCWE-8632026-03-05
CVE-2026-28454High8.2OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram WebhookCWE-3452026-03-05
CVE-2026-28464High8.2OpenClaw < 2026.2.12 - Timing Attack in Hooks Token AuthenticationCWE-2082026-03-05
CVE-2026-28465High8.2OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded HeadersCWE-3452026-03-05
CVE-2026-28469High8.2OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misroutingCWE-6392026-03-05
CVE-2026-29613High8.2OpenClaw < 2026.2.12 - Webhook Authentication Bypass via Loopback remoteAddress TrustCWE-3062026-03-05
CVE-2026-29611High8.2OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media HandlingCWE-732026-03-05
CVE-2026-25157High7.8OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommandCWE-782026-02-04
CVE-2026-27002High7.7OpenClaw: Docker container escape via unvalidated bind mount config injectionCWE-2502026-02-19
CVE-2026-29610High7.7OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH HandlingCWE-4272026-03-05
CVE-2026-26322High7.6OpenClaw Gateway tool allowed unrestricted gatewayUrl overrideCWE-9182026-02-19
CVE-2026-27487High7.6OpenClaw: Prevent shell injection in macOS keychain credential writeCWE-782026-02-21
CVE-2026-25474High7.5OpenClaw has a Telegram webhook request forgery (missing channels.telegram.webhookSecret) → auth bypassCWE-3452026-02-19
CVE-2026-26319High7.5OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated RequestsCWE-3062026-02-19
CVE-2026-26321High7.5OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extensionCWE-222026-02-19
CVE-2026-26316High7.5OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trustCWE-8632026-02-19
CVE-2026-26324High7.5OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable)CWE-9182026-02-19
CVE-2026-28485High7.5OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP EndpointsCWE-3062026-03-05
CVE-2026-28458High7.4OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie accessCWE-3062026-03-05
CVE-2026-26325High7.2OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvalsCWE-2842026-02-19
CVE-2026-28473High7.2OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat CommandCWE-8632026-03-05
CVE-2026-26317High7.1OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpointsCWE-3522026-02-19
CVE-2026-26320High7.1OpenClaw macOS deep link confirmation truncation can conceal executed agent messageCWE-4512026-02-19
CVE-2026-26329High7.1OpenClaw has a path traversal in browser upload allows local file readCWE-222026-02-19
CVE-2026-26327High7.1OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinningCWE-3452026-02-19
CVE-2026-28459High7.1OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile PathCWE-732026-03-05
CVE-2026-28447High7OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package NameCWE-222026-03-05
CVE-2026-27003Medium6.9OpenClaw: Telegram bot token exposure via logsCWE-5222026-02-19
CVE-2026-27004Medium6.9OpenClaw session tool visibility hardening and Telegram webhook secret fallbackCWE-209, CWE-3462026-02-19
CVE-2026-27488Medium6.9OpenClaw hardened cron webhook delivery against SSRFCWE-9182026-02-21
CVE-2026-28394Medium6.9OpenClaw < 2026.2.15 - Denial of Service via Unbounded Response Parsing in web_fetch ToolCWE-7702026-03-05
CVE-2026-28467Medium6.9OpenClaw < 2026.2.2 - SSRF via Attachment Media URL HydrationCWE-9182026-03-05
CVE-2026-28480Medium6.9OpenClaw Telegram allowlist authorization accepted mutable usernamesCWE-2902026-03-05
CVE-2026-27008Medium6.8OpenClaw hardened the skill download target directory validationCWE-732026-02-19
CVE-2026-28486Medium6.8OpenClaw 2026.1.16-2 < 2026.2.14 - Path Traversal (Zip Slip) in Archive Extraction via Installation CommandsCWE-222026-03-05
CVE-2026-29612Medium6.8OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File DecodingCWE-7702026-03-05
CVE-2026-26972Medium6.7OpenClaw has a Path Traversal in Browser Download FunctionalityCWE-222026-02-19
CVE-2026-28452Medium6.7OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR)CWE-7702026-03-05
CVE-2026-25475Medium6.5OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path ExtractionCWE-200, CWE-222026-02-04
CVE-2026-26328Medium6.5OpenClaw iMessage group allowlist authorization inherited DM pairing-store identitiesCWE-284, CWE-8632026-02-19
CVE-2026-28448Medium6.3OpenClaw 2026.1.29 < 2026.2.1 - Authorization Bypass in Twitch Plugin allowFrom Access ControlCWE-2852026-03-05
CVE-2026-28395Medium6.3OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrlCWE-13272026-03-05
CVE-2026-28451Medium6.3OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media FetchingCWE-9182026-03-05
CVE-2026-28475Medium6.3OpenClaw < 2026.2.13 - Timing Attack via Hook Token ComparisonCWE-2082026-03-05
CVE-2026-28471Medium6.3OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix PluginCWE-2872026-03-05
CVE-2026-29606Medium6.3OpenClaw < 2026.2.14 - Webhook Signature Verification Bypass via ngrok Loopback CompatibilityCWE-3062026-03-05
CVE-2026-28476Medium6.3OpenClaw < 2026.2.14 - Server-Side Request Forgery in Tlon Extension AuthenticationCWE-9182026-03-05
CVE-2026-28477Medium5.9OpenClaw < 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login FlowCWE-3522026-03-05
CVE-2026-28481Medium5.9OpenClaw < 2026.2.1 - Bearer Token Leakage via MS Teams Attachment Downloader Suffix MatchingCWE-2012026-03-05
CVE-2026-27009Medium5.8OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injectionCWE-792026-02-19
CVE-2026-28457Medium5.6OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name ParameterCWE-222026-03-05
CVE-2026-26326Medium5.3OpenClaw skills.status could leak secrets to operator.read clientsCWE-2002026-02-19
CVE-2026-27007Medium4.8OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreationCWE-12542026-02-19
CVE-2026-27576Medium4.8OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputsCWE-4002026-02-21
CVE-2026-27485Medium4.6OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injectionCWE-612026-02-21
CVE-2026-27486Medium4.3OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process CleanupCWE-2832026-02-21
CVE-2026-24764Low3.7OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel DescriptionsCWE-74, CWE-942026-02-19
CVE-2026-27484Low2.3OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flowsCWE-8622026-02-21
📖 Detailed CVE Analysis (click to expand)

CVE-2026-28363 — In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be…

FieldDetail
CVSS9.9 (CRITICAL) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWECWE-184 (CWE-184 Incomplete List of Disallowed Inputs)
Affected< 2026.2.23
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-3c6h-g97w-fg78

In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.


CVE-2026-28466 — OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass

FieldDetail
CVSS9.4 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CWECWE-863 (Incorrect Authorization)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-gv46-4xfq-jv58

OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attackers with valid gateway credentials can inject approval control fields to execute arbitrary commands on connected node hosts, potentially compromising developer workstations and CI runners.

References:


CVE-2026-28474 — OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing

FieldDetail
CVSS9.3 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-863 (Incorrect Authorization)
Affected< 2026.2.6
Vendor/ProductOpenClaw / nextcloud-talk
AdvisoryGHSA-r5h9-vjqc-hq3r

OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.

References:


CVE-2026-28446 — OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching

FieldDetail
CVSS9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
CWECWE-303 (Incorrect Implementation of Authentication Algorithm)
Affected< 2026.2.1
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-4rj2-gpmh-qq5x

OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.

References:


CVE-2026-28391 — OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcement

FieldDetail
CVSS9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-184 (Incomplete List of Disallowed Inputs)
Affected< 2026.2.2
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-qj77-c3c8-9c3q

OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metacharacters like & or %...% to execute unapproved commands beyond the allowlisted operations.

References:


CVE-2026-28472 — OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake

FieldDetail
CVSS9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-306 (Missing Authentication for Critical Function)
Affected< 2026.2.2
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-rv39-79c4-7459

OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without providing device identity or pairing by exploiting the presence check instead of validation, potentially gaining operator access in vulnerable deployments.

References:


CVE-2026-28470 — OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double Quotes

FieldDetail
CVSS9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-88 (Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'))
Affected< 2026.2.2
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-3hcm-ggvf-rch5

OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection by embedding unescaped $() or backticks inside double-quoted strings to execute unauthorized commands.

References:


CVE-2026-24763 — OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable

FieldDetail
CVSS8.8 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWECWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected< 2026.1.29
Vendor/Productclawdbot / clawdbot
AdvisoryGHSA-mc68-q9jw-2h3v

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the container context. This vulnerability is fixed in 2026.1.29.

Naming note: Uses old name clawdbot/clawdbot as vendor/product. References:


CVE-2026-25253 — OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl

FieldDetail
CVSS8.8 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWECWE-669 (CWE-669 Incorrect Resource Transfer Between Spheres)
Affected< 2026.1.29
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-g8p2-7wf7-98mq

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

Naming note: Uses all three names in description. packageURL still references pkg:npm/clawdbot. References:


CVE-2026-28462 — OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths

FieldDetail
CVSS8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.2.13
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-gq9c-wg68-gwj2

OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/stop, POST /wait/download, and POST /download endpoints to write files outside intended temp roots.

References:


CVE-2026-28478 — OpenClaw affected by denial of service via unbounded webhook request body buffering

FieldDetail
CVSS8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWECWE-770 (Allocation of Resources Without Limits or Throttling)
Affected< 2026.2.13
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-q447-rj3r-2cgh

OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to webhook endpoints causing memory pressure and availability degradation.

References:


CVE-2026-28479 — OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration

FieldDetail
CVSS8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-327 (Use of a Broken or Risky Cryptographic Algorithm)
Affected< 2026.2.15
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-fh3f-q9qw-93j9

OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache poisoning, allowing one sandbox configuration to be misinterpreted as another and enabling unsafe sandbox state reuse.

References:


CVE-2026-29609 — OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media Fetch

FieldDetail
CVSS8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWECWE-770 (Allocation of Resources Without Limits or Throttling)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-j27p-hq53-9wgc

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by serving oversized responses without content-length headers to cause availability loss.

References:


CVE-2026-26323 — OpenClaw has a command injection in maintainer clawtributors updater

FieldDetail
CVSS8.6 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected< >= 2026.1.8, < 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-m7x8-2w3w-pr42

OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script scripts/update-clawtributors.ts. The issue affects contributors/maintainers (or CI) who run bun scripts/update-clawtributors.ts in a source checkout that contains a malicious commit author email (e.g. crafted @users[.]noreply[.]github[.]com values). Normal CLI usage is not affected (npm i -g openclaw): this script is not part of the shipped CLI and is not executed during routine operation. The script derived a GitHub login from git log author metadata and interpolated it into a shell command (via execSync). A malicious commit record could inject shell metacharacters and execute arbitrary commands when the script is run. Version 2026.2.14 contains a patch.

References:


CVE-2026-27001 — OpenClaw: Unsanitized CWD path injection into LLM prompts

FieldDetail
CVSS8.6 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-77 (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'))
Affected< 2026.2.15
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-2qj5-gwg2-xwc4

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose name contains control/format characters (for example newlines or Unicode bidi/zero-width markers), those characters could break the prompt structure and inject attacker-controlled instructions. Starting in version 2026.2.15, the workspace path is sanitized before it is embedded into any LLM prompt output, stripping Unicode control/format characters and explicit line/paragraph separators. Workspace path resolution also applies the same sanitization as defense-in-depth.

References:


CVE-2026-28456 — OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path Handling

FieldDetail
CVSS8.6 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-427 (Uncontrolled Search Path Element)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-v6c6-vqqg-w888

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process.

References:


CVE-2026-28463 — OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist

FieldDetail
CVSS8.6 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-xvhf-x56f-2hpp

OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.

References:


CVE-2026-28468 — OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server

FieldDetail
CVSS8.5 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-306 (Missing Authentication for Critical Function)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-h9g4-589h-68xv

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts.

References:


CVE-2026-25593 — OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply

FieldDetail
CVSS8.4 (HIGH) — CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWECWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')), CWE-306 (CWE-306: Missing Authentication for Critical Function)
Affected< 2026.1.20
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-g55j-c2v4-pjcg

OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling command injection as the gateway user. This vulnerability is fixed in 2026.1.20.


CVE-2026-28482 — OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters

FieldDetail
CVSS8.4 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.2.12
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-5xfq-5mr7-426q

OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.

References:


CVE-2026-28393 — OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal

FieldDetail
CVSS8.3 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-427 (Uncontrolled Search Path Element)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-7xhj-55q9-pc3m

OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges.

References:


CVE-2026-28453 — OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction

FieldDetail
CVSS8.3 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-p25h-9q54-ffvw

OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ../../ to write files outside extraction boundaries, potentially enabling configuration tampering and code execution.

References:


CVE-2026-28450 — OpenClaw < 2026.2.12 - Unauthenticated Profile Tampering via Nostr Plugin HTTP Endpoints

FieldDetail
CVSS8.3 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-306 (Missing Authentication for Critical Function)
Affected< 2026.2.12
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-mv9j-6xhh-g383

OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profiles without gateway authentication. Remote attackers can exploit these endpoints to read sensitive profile data, modify Nostr profiles, persist malicious changes to gateway configuration, and publish signed Nostr events using the bot's private key when the gateway HTTP port is accessible beyond localhost.

References:


CVE-2026-28392 — OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages

FieldDetail
CVSS8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-863 (Incorrect Authorization)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-v773-r54f-q32w

OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privileged slash commands via direct message to bypass allowlist and access-group restrictions.

References:


CVE-2026-28454 — OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram Webhook

FieldDetail
CVSS8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-345 (Insufficient Verification of Data Authenticity)
Affected< 2026.2.2
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-fhvm-j76f-qmjv

OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can forge Telegram updates by spoofing message.from.id and chat.id fields to bypass sender allowlists and execute privileged bot commands.

References:


CVE-2026-28464 — OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication

FieldDetail
CVSS8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-208 (Observable Timing Discrepancy)
Affected< 2026.2.12
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-jmm5-fvh5-gf4p

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually determine the authentication token.

References:


CVE-2026-28465 — OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers

FieldDetail
CVSS8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-345 (Insufficient Verification of Data Authenticity)
Affected< 2026.2.3
Vendor/ProductOpenClaw / voice-call
AdvisoryGHSA-3m3q-x3gj-f79x

OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* headers in reverse-proxy configurations that implicitly trust these headers.

References:


CVE-2026-28469 — OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting

FieldDetail
CVSS8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-639 (Authorization Bypass Through User-Controlled Key)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-rq6g-px6m-c248

OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.

References:


CVE-2026-29613 — OpenClaw < 2026.2.12 - Webhook Authentication Bypass via Loopback remoteAddress Trust

FieldDetail
CVSS8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-306 (Missing Authentication for Critical Function)
Affected< 2026.2.12
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-xc7w-v5x6-cc87

OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint.

References:


CVE-2026-29611 — OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media Handling

FieldDetail
CVSS8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-73 (External Control of File Name or Path)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-rwj8-p9vq-25gv

OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBubblesMedia function fails to validate mediaPath parameters against an allowlist, enabling attackers to request sensitive files like /etc/passwd and exfiltrate them as media attachments.

References:


CVE-2026-25157 — OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand

FieldDetail
CVSS7.8 (HIGH) — CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
CWECWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected< 2026.1.29
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-q284-4pvr-m585

OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-supplied project path in an error message. When the cd command failed, the unescaped path was interpolated directly into an echo statement, allowing arbitrary command execution on the remote SSH host. The parseSSHTarget function did not validate that SSH target strings could not begin with a dash. An attacker-supplied target like -oProxyCommand=... would be interpreted as an SSH configuration flag rather than a hostname, allowing arbitrary command execution on the local machine. This issue has been patched in version 2026.1.29.


CVE-2026-27002 — OpenClaw: Docker container escape via unvalidated bind mount config injection

FieldDetail
CVSS7.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-250 (CWE-250: Execution with Unnecessary Privileges)
Affected< 2026.2.15
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-w235-x559-36mg

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access. OpenClaw 2026.2.15 blocks dangerous sandbox Docker settings and includes runtime enforcement when building docker create args; config-schema validation for network=host, seccompProfile=unconfined, apparmorProfile=unconfined; and security audit findings to surface dangerous sandbox docker config. As a workaround, do not configure agents.*.sandbox.docker.binds to mount system directories or Docker socket paths, keep agents.*.sandbox.docker.network at none (default) or bridge, and do not use unconfined for seccomp/AppArmor profiles.

References:


CVE-2026-29610 — OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling

FieldDetail
CVSS7.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-427 (Uncontrolled Search Path Element)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-jqpq-mgvm-f9r6

OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.

References:


CVE-2026-26322 — OpenClaw Gateway tool allowed unrestricted gatewayUrl override

FieldDetail
CVSS7.6 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
CWECWE-918 (CWE-918: Server-Side Request Forgery (SSRF))
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-g6q9-8fvw-f7rf

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied gatewayUrl without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets. This requires the ability to invoke tools that accept gatewayUrl overrides (directly or indirectly). In typical setups this is limited to authenticated operators, trusted automation, or environments where tool calls are exposed to non-operators. In other words, this is not a drive-by issue for arbitrary internet users unless a deployment explicitly allows untrusted users to trigger these tool calls. Some tool call paths allowed gatewayUrl overrides to flow into the Gateway WebSocket client without validation or allowlisting. This meant the host could be instructed to attempt connections to non-gateway endpoints (for example, localhost services, private network addresses, or cloud metadata IPs). In the common case, this results in an outbound connection attempt from the OpenClaw host (and corresponding errors/timeouts). In environments where the tool caller can observe the results, this can also be used for limited network reachability probing. If the target speaks WebSocket and is reachable, further interaction may be possible. Starting in version 2026.2.14, tool-supplied gatewayUrl overrides are restricted to loopback (on the configured gateway port) or the configured gateway.remote.url. Disallowed protocols, credentials, query/hash, and non-root paths are rejected.

References:


CVE-2026-27487 — OpenClaw: Prevent shell injection in macOS keychain credential write

FieldDetail
CVSS7.6 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
CWECWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-4564-pvr2-qq4h

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w .... Because OAuth tokens are user-controlled data, this created an OS command injection risk. This issue has been fixed in version 2026.2.14.

References:


CVE-2026-25474 — OpenClaw has a Telegram webhook request forgery (missing channels.telegram.webhookSecret) → auth bypass

FieldDetail
CVSS7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWECWE-345 (CWE-345: Insufficient Verification of Data Authenticity)
Affected< 2026.2.1
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-mp5h-m6qj-6292

OpenClaw is a personal AI assistant. In versions 2026.1.30 and below, if channels.telegram.webhookSecret is not set when in Telegram webhook mode, OpenClaw may accept webhook HTTP requests without verifying Telegram’s secret token header. In deployments where the webhook endpoint is reachable by an attacker, this can allow forged Telegram updates (for example spoofing message.from.id). If an attacker can reach the webhook endpoint, they may be able to send forged updates that are processed as if they came from Telegram. Depending on enabled commands/tools and configuration, this could lead to unintended bot actions. Note: Telegram webhook mode is not enabled by default. It is enabled only when channels.telegram.webhookUrl is configured. This issue has been fixed in version 2026.2.1.

References:


CVE-2026-26319 — OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests

FieldDetail
CVSS7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWECWE-306 (CWE-306: Missing Authentication for Critical Function)
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-4hg8-92x6-h2f3

OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated callers to forge Telnyx events. Telnyx webhooks are expected to be authenticated via Ed25519 signature verification. In affected versions, TelnyxProvider.verifyWebhook() could effectively fail open when no Telnyx public key was configured, allowing arbitrary HTTP POST requests to the voice-call webhook endpoint to be treated as legitimate Telnyx events. This only impacts deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is reachable from the attacker (for example, publicly exposed via a tunnel/proxy). The issue has been fixed in version 2026.2.14.

References:


CVE-2026-26321 — OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension

FieldDetail
CVSS7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWECWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-8jpq-5h99-ff5r

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed sendMediaFeishu to treat attacker-controlled mediaUrl values as local filesystem paths and read them directly. If an attacker can influence tool calls (directly or via prompt injection), they may be able to exfiltrate local files by supplying paths such as /etc/passwd as mediaUrl. Upgrade to OpenClaw 2026.2.14 or newer to receive a fix. The fix removes direct local file reads from this path and routes media loading through hardened helpers that enforce local-root restrictions.

References:


CVE-2026-26316 — OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust

FieldDetail
CVSS7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWECWE-863 (CWE-863: Incorrect Authorization)
Affected< 2026.2.13
Vendor/Productopenclaw / @openclaw/bluebubbles
AdvisoryGHSA-pchc-86f6-8758

OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (127.0.0.1, ::1, ::ffff:127.0.0.1) even when the configured webhook secret was missing or incorrect. This does not affect the default iMessage integration unless BlueBubbles is installed and enabled. Version 2026.2.13 contains a patch. Other mitigations include setting a non-empty BlueBubbles webhook password and avoiding deployments where a public-facing reverse proxy forwards to a loopback-bound Gateway without strong upstream authentication.

References:


CVE-2026-26324 — OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable)

FieldDetail
CVSS7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWECWE-918 (CWE-918: Server-Side Request Forgery (SSRF))
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-jrvc-8ff5-2f9f

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as 0:0:0:0:0:ffff:7f00:1 (which is 127.0.0.1). This could allow requests that should be blocked (loopback / private network / link-local metadata) to pass the SSRF guard. Version 2026.2.14 patches the issue.

References:


CVE-2026-28485 — OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints

FieldDetail
CVSS7.5 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
CWECWE-306 (Missing Authentication for Critical Function)
Affected< 2026.2.12
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-qpjj-47vm-64pj

OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or local processes can execute arbitrary browser-context actions and access sensitive in-session data by sending requests to unauthenticated endpoints.

References:


CVE-2026-28458 — OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access

FieldDetail
CVSS7.4 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-306 (Missing Authentication for Critical Function)
Affected< 2026.2.1
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-mr32-vwc2-5j6h

OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopback and access sensitive data. Attackers can exploit this by connecting to ws://127.0.0.1:18792/cdp to steal session cookies and execute JavaScript in other browser tabs.

References:


CVE-2026-26325 — OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals

FieldDetail
CVSS7.2 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWECWE-284 (CWE-284: Improper Access Control)
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-h3f9-mjwj-w476

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between rawCommand and command[] in the node host system.run handler could cause allowlist/approval evaluation to be performed on one command while executing a different argv. This only impacts deployments that use the node host / companion node execution path (system.run on a node), enable allowlist-based exec policy (security=allowlist) with approval prompting driven by allowlist misses (for example ask=on-miss), allow an attacker to invoke system.run. Default/non-node configurations are not affected. Version 2026.2.14 enforces rawCommand/command[] consistency (gateway fail-fast + node host validation).

References:


CVE-2026-28473 — OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command

FieldDetail
CVSS7.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-863 (Incorrect Authorization)
Affected< 2026.2.2
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-mqpw-46fh-299h

OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval.resolve through an internal privileged gateway client, bypassing the operator.approvals permission check that protects direct RPC calls.

References:


CVE-2026-26317 — OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints

FieldDetail
CVSS7.1 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
CWECWE-352 (CWE-352: Cross-Site Request Forgery (CSRF))
Affected<= 2026.1.24-3
Vendor/Productopenclaw / clawdbot
AdvisoryGHSA-3fqr-4cg8-h96q

OpenClaw is a personal AI assistant. Prior to 2026.2.14, browser-facing localhost mutation routes accepted cross-origin browser requests without explicit Origin/Referer validation. Loopback binding reduces remote exposure but does not prevent browser-initiated requests from malicious origins. A malicious website can trigger unauthorized state changes against a victim's local OpenClaw browser control plane (for example opening tabs, starting/stopping the browser, mutating storage/cookies) if the browser control service is reachable on loopback in the victim's browser context. Starting in version 2026.2.14, mutating HTTP methods (POST/PUT/PATCH/DELETE) are rejected when the request indicates a non-loopback Origin/Referer (or Sec-Fetch-Site: cross-site). Other mitigations include enabling browser control auth (token/password) and avoid running with auth disabled.

Naming note: Uses old name openclaw/clawdbot as vendor/product. References:


CVE-2026-26320 — OpenClaw macOS deep link confirmation truncation can conceal executed agent message

FieldDetail
CVSS7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-451 (CWE-451: User Interface (UI) Misrepresentation of Critical Information)
Affected< >= 2026.2.6-0, < 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-7q2j-c4q5-rm27

OpenClaw is a personal AI assistant. OpenClaw macOS desktop client registers the openclaw:// URL scheme. For openclaw://agent deep links without an unattended key, the app shows a confirmation dialog that previously displayed only the first 240 characters of the message, but executed the full message after the user clicked "Run." At the time of writing, the OpenClaw macOS desktop client is still in beta. In versions 2026.2.6 through 2026.2.13, an attacker could pad the message with whitespace to push a malicious payload outside the visible preview, increasing the chance a user approves a different message than the one that is actually executed. If a user runs the deep link, the agent may perform actions that can lead to arbitrary command execution depending on the user's configured tool approvals/allowlists. This is a social-engineering mediated vulnerability: the confirmation prompt could be made to misrepresent the executed message. The issue is fixed in 2026.2.14. Other mitigations include not approve unexpected "Run OpenClaw agent?" prompts triggered while browsing untrusted sites and usingunattended deep links only with a valid key for trusted personal automations.

References:


CVE-2026-26329 — OpenClaw has a path traversal in browser upload allows local file read

FieldDetail
CVSS7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-cv7m-c9jx-vg7q

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, authenticated attackers can read arbitrary files from the Gateway host by supplying absolute paths or path traversal sequences to the browser tool's upload action. The server passed these paths to Playwright's setInputFiles() APIs without restricting them to a safe root. An attacker must reach the Gateway HTTP surface (or otherwise invoke the same browser control hook endpoints); present valid Gateway auth (bearer token / password), as required by the Gateway configuration (In common default setups, the Gateway binds to loopback and the onboarding wizard generates a gateway token even for loopback); and have the browser tool permitted by tool policy for the target session/context (and have browser support enabled). If an operator exposes the Gateway beyond loopback (LAN/tailnet/custom bind, reverse proxy, tunnels, etc.), the impact increases accordingly. Starting in version 2026.2.14, the upload paths are now confined to OpenClaw's temp uploads root (DEFAULT_UPLOAD_DIR) and traversal/escape paths are rejected.

References:


CVE-2026-26327 — OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning

FieldDetail
CVSS7.1 (HIGH) — CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-345 (CWE-345: Insufficient Verification of Data Authenticity)
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-pv58-549p-qh99

OpenClaw is a personal AI assistant. Discovery beacons (Bonjour/mDNS and DNS-SD) include TXT records such as lanHost, tailnetDns, gatewayPort, and gatewayTlsSha256. TXT records are unauthenticated. Prior to version 2026.2.14, some clients treated TXT values as authoritative routing/pinning inputs. iOS and macOS used TXT-provided host hints (lanHost/tailnetDns) and ports (gatewayPort) to build the connection URL. iOS and Android allowed the discovery-provided TLS fingerprint (gatewayTlsSha256) to override a previously stored TLS pin. On a shared/untrusted LAN, an attacker could advertise a rogue _openclaw-gw._tcp service. This could cause a client to connect to an attacker-controlled endpoint and/or accept an attacker certificate, potentially exfiltrating Gateway credentials (auth.token / auth.password) during connection. As of time of publication, the iOS and Android apps are alpha/not broadly shipped (no public App Store / Play Store release). Practical impact is primarily limited to developers/testers running those builds, plus any other shipped clients relying on discovery on a shared/untrusted LAN. Version 2026.2.14 fixes the issue. Clients now prefer the resolved service endpoint (SRV + A/AAAA) over TXT-provided routing hints. Discovery-provided fingerprints no longer override stored TLS pins. In iOS/Android, first-time TLS pins require explicit user confirmation (fingerprint shown; no silent TOFU) and discovery-based direct connects are TLS-only. In Android, hostname verification is no longer globally disabled (only bypassed when pinning).

References:


CVE-2026-28459 — OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile Path

FieldDetail
CVSS7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
CWECWE-73 (External Control of File Name or Path)
Affected< 2026.2.12
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-64qx-vpxx-mvqf

OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service.

References:


CVE-2026-28447 — OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package Name

FieldDetail
CVSS7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
CWECWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.2.1
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-qrq5-wjgg-rvqw

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing path traversal sequences like .. to write files outside the intended installation directory when victims run the plugins install command.

References:


CVE-2026-27003 — OpenClaw: Telegram bot token exposure via logs

FieldDetail
CVSS6.9 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-522 (CWE-522: Insufficiently Protected Credentials)
Affected< 2026.2.15
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-chf7-jq6g-qrwv

OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error messages and stack traces (for example, when request URLs include https://api.telegram.org/bot<token>/...). Prior to version 2026.2.15, OpenClaw logged these strings without redaction, which could leak the bot token into logs, crash reports, CI output, or support bundles. Disclosure of a Telegram bot token allows an attacker to impersonate the bot and take over Bot API access. Users should upgrade to version 2026.2.15 to obtain a fix and rotate the Telegram bot token if it may have been exposed.

References:


CVE-2026-27004 — OpenClaw session tool visibility hardening and Telegram webhook secret fallback

FieldDetail
CVSS6.9 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-209 (CWE-209: Generation of Error Message Containing Sensitive Information), CWE-346 (CWE-346: Origin Validation Error)
Affected< 2026.2.15
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-6hf3-mhgc-cm65

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, in some shared-agent deployments, OpenClaw session tools (sessions_list, sessions_history, sessions_send) allowed broader session targeting than some operators intended. This is primarily a configuration/visibility-scoping issue in multi-user environments where peers are not equally trusted. In Telegram webhook mode, monitor startup also did not fall back to per-account webhookSecret when only the account-level secret was configured. In shared-agent, multi-user, less-trusted environments: session-tool access could expose transcript content across peer sessions. In single-agent or trusted environments, practical impact is limited. In Telegram webhook mode, account-level secret wiring could be missed unless an explicit monitor webhook secret override was provided. Version 2026.2.15 fixes the issue.

References:


CVE-2026-27488 — OpenClaw hardened cron webhook delivery against SSRF

FieldDetail
CVSS6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:L
CWECWE-918 (CWE-918: Server-Side Request Forgery (SSRF))
Affected< 2026.2.19
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-w45g-5746-x9fp

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/gateway/server-cron.ts uses fetch() directly, so webhook targets can reach private/metadata/internal endpoints without SSRF policy checks. This issue was fixed in version 2026.2.19.

References:


CVE-2026-28394 — OpenClaw < 2026.2.15 - Denial of Service via Unbounded Response Parsing in web_fetch Tool

FieldDetail
CVSS6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWECWE-770 (Allocation of Resources Without Limits or Throttling)
Affected< 2026.2.15
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-p536-vvpp-9mc8

OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability in the web_fetch tool that allows attackers to crash the Gateway process through memory exhaustion by parsing oversized or deeply nested HTML responses. Remote attackers can social-engineer users into fetching malicious URLs with pathological HTML structures to exhaust server memory and cause service unavailability.

References:


CVE-2026-28467 — OpenClaw < 2026.2.2 - SSRF via Attachment Media URL Hydration

FieldDetail
CVSS6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CWECWE-918 (Server-Side Request Forgery (SSRF))
Affected< 2026.2.2
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-wfp2-v9c7-fh79

OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlled sendAttachment or auto-reply mechanisms can trigger SSRF to internal resources and exfiltrate fetched response bytes as outbound attachments.

References:


CVE-2026-28480 — OpenClaw Telegram allowlist authorization accepted mutable usernames

FieldDetail
CVSS6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CWECWE-290 (Authentication Bypass by Spoofing)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-mj5r-hh7j-4gxf

OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerability where Telegram allowlist matching accepts mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identity by obtaining recycled usernames to bypass allowlist restrictions and interact with bots as unauthorized senders.

References:


CVE-2026-27008 — OpenClaw hardened the skill download target directory validation

FieldDetail
CVSS6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
CWECWE-73 (CWE-73: External Control of File Name or Path)
Affected< 2026.2.15
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-h7f7-89mm-pqh6

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a bug in download skill installation allowed targetDir values from skill frontmatter to resolve outside the per-skill tools directory if not strictly validated. In the admin-only skills.install flow, this could write files outside the intended install sandbox. Version 2026.2.15 contains a fix for the issue.

References:


CVE-2026-28486 — OpenClaw 2026.1.16-2 < 2026.2.14 - Path Traversal (Zip Slip) in Archive Extraction via Installation Commands

FieldDetail
CVSS6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
CWECWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-v892-hwpg-jwqp

OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a path traversal vulnerability in archive extraction during installation commands that allows arbitrary file writes outside the intended directory. Attackers can craft malicious archives that, when extracted via skills install, hooks install, plugins install, or signal install commands, write files to arbitrary locations enabling persistence or code execution.

References:


CVE-2026-29612 — OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding

FieldDetail
CVSS6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWECWE-770 (Allocation of Resources Without Limits or Throttling)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-w2cg-vxx6-5xjg

OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service.

References:


CVE-2026-26972 — OpenClaw has a Path Traversal in Browser Download Functionality

FieldDetail
CVSS6.7 (MEDIUM) — CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWECWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< >= 2026.1.12, < 2026.2.13
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-xwjm-j929-xq7c

OpenClaw is a personal AI assistant. In versions 2026.1.12 through 2026.2.12, OpenClaw browser download helpers accepted an unsanitized output path. When invoked via the browser control gateway routes, this allowed path traversal to write downloads outside the intended OpenClaw temp downloads directory. This issue is not exposed via the AI agent tool schema (no download action). Exploitation requires authenticated CLI access or an authenticated gateway RPC token. Version 2026.2.13 fixes the issue.

References:


CVE-2026-28452 — OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR)

FieldDetail
CVSS6.7 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWECWE-770 (Allocation of Resources Without Limits or Throttling)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-h89v-j3x9-8wqj

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can trigger resource exhaustion by providing maliciously crafted archive files during install or update operations, causing service degradation or system unavailability.

References:


CVE-2026-25475 — OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction

FieldDetail
CVSS6.5 (MEDIUM) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWECWE-200 (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor), CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.1.30
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-r8g4-86fx-92mq

OpenClaw is a personal AI assistant. Prior to version 2026.1.30, the isValidMedia() function in src/media/parse.ts allows arbitrary file paths including absolute paths, home directory paths, and directory traversal sequences. An agent can read any file on the system by outputting MEDIA:/path/to/file, exfiltrating sensitive data to the user/channel. This issue has been patched in version 2026.1.30.


CVE-2026-26328 — OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities

FieldDetail
CVSS6.5 (MEDIUM) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CWECWE-284 (CWE-284: Improper Access Control), CWE-863 (CWE-863: Incorrect Authorization)
Affected<= 2026.1.24-3
Vendor/Productopenclaw / clawdbot
AdvisoryGHSA-g34w-4xqq-h79m

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, under iMessage groupPolicy=allowlist, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts. Version 2026.2.14 fixes the issue.

Naming note: Uses old name openclaw/clawdbot as vendor/product. References:


CVE-2026-28448 — OpenClaw 2026.1.29 < 2026.2.1 - Authorization Bypass in Twitch Plugin allowFrom Access Control

FieldDetail
CVSS6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
CWECWE-285 (Improper Authorization)
Affected< 2026.2.1
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-33rq-m5x2-fvgf

OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a vulnerability in the Twitch plugin (must be installed and enabled) in which it fails to enforce the allowFrom allowlist when allowedRoles is unset or empty, allowing unauthorized Twitch users to trigger agent dispatch. Remote attackers can mention the bot in Twitch chat to bypass access control and invoke the agent pipeline, potentially causing unintended actions or resource exhaustion.

References:


CVE-2026-28395 — OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrl

FieldDetail
CVSS6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
CWECWE-1327 (Binding to an Unrestricted IP Address)
Affected< 2026.2.12
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-qw99-grcx-4pvm

OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper network binding vulnerability in the Chrome extension (must be installed and enabled) relay server that treats wildcard hosts as loopback addresses, allowing the relay HTTP/WS server to bind to all interfaces when a wildcard cdpUrl is configured. Remote attackers can access relay HTTP endpoints off-host to leak service presence and port information, or conduct denial-of-service and brute-force attacks against the relay token header.

References:


CVE-2026-28451 — OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching

FieldDetail
CVSS6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CWECWE-918 (Server-Side Request Forgery (SSRF))
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-x22m-j5qq-j49m

OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image processing. Attackers can influence tool calls through direct manipulation or prompt injection to trigger requests to internal services and re-upload responses as Feishu media.

References:


CVE-2026-28475 — OpenClaw < 2026.2.13 - Timing Attack via Hook Token Comparison

FieldDetail
CVSS6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CWECWE-208 (Observable Timing Discrepancy)
Affected< 2026.2.13
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-47q7-97xp-m272

OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually recover the authentication token.

References:


CVE-2026-28471 — OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin

FieldDetail
CVSS6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-287 (Improper Authentication)
Affected< 2026.2.2
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-rmxw-jxxx-4cpc

OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.

References:


CVE-2026-29606 — OpenClaw < 2026.2.14 - Webhook Signature Verification Bypass via ngrok Loopback Compatibility

FieldDetail
CVSS6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
CWECWE-306 (Missing Authentication for Critical Function)
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-c37p-4qqg-3p76

OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification bypass in the voice-call extension that allows unauthenticated requests when the tunnel.allowNgrokFreeTierLoopbackBypass option is explicitly enabled. An external attacker can send forged requests to the publicly reachable webhook endpoint without a valid X-Twilio-Signature header, resulting in unauthorized webhook event handling and potential request flooding attacks.

References:


CVE-2026-28476 — OpenClaw < 2026.2.14 - Server-Side Request Forgery in Tlon Extension Authentication

FieldDetail
CVSS6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CWECWE-918 (Server-Side Request Forgery (SSRF))
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-pg2v-8xwh-qhcc

OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the configured Urbit URL can induce the gateway to make HTTP requests to arbitrary hosts including internal addresses.

References:


CVE-2026-28477 — OpenClaw < 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow

FieldDetail
CVSS5.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
CWECWE-352 (Cross-Site Request Forgery (CSRF))
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-7rcp-mxpq-72pj

OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.

References:


CVE-2026-28481 — OpenClaw < 2026.2.1 - Bearer Token Leakage via MS Teams Attachment Downloader Suffix Matching

FieldDetail
CVSS5.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-201 (Insertion of Sensitive Information Into Sent Data)
Affected< 0
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-7vwx-582j-j332

OpenClaw versions 2026.1.30 and earlier, contain an information disclosure vulnerability, patched in 2026.2.1, in the MS Teams attachment downloader (optional extension must be enabled) that leaks bearer tokens to allowlisted suffix domains. When retrying downloads after receiving 401 or 403 responses, the application sends Authorization bearer tokens to untrusted hosts matching the permissive suffix-based allowlist, enabling token theft.

References:


CVE-2026-27009 — OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection

FieldDetail
CVSS5.8 (MEDIUM) — CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
CWECWE-79 (CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
Affected< 2026.2.15
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-37gc-85xm-2ww6

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a atored XSS issue in the OpenClaw Control UI when rendering assistant identity (name/avatar) into an inline <script> tag without script-context-safe escaping. A crafted value containing </script> could break out of the script tag and execute attacker-controlled JavaScript in the Control UI origin. Version 2026.2.15 removed inline script injection and serve bootstrap config from a JSON endpoint and added a restrictive Content Security Policy for the Control UI (script-src 'self', no inline scripts).

References:


CVE-2026-28457 — OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter

FieldDetail
CVSS5.6 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
CWECWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected< 2026.2.14
Vendor/ProductOpenClaw / OpenClaw
AdvisoryGHSA-xw4p-pw82-hqr7

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences like ../ or absolute paths in the name field can write files outside the sandbox workspace root directory.

References:


CVE-2026-26326 — OpenClaw skills.status could leak secrets to operator.read clients

FieldDetail
CVSS5.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CWECWE-200 (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor)
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-8mh7-phf8-xgfm

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, skills.status could disclose secrets to operator.read clients by returning raw resolved config values in configChecks for skill requires.config paths. Version 2026.2.14 stops including raw resolved config values in requirement checks (return only { path, satisfied }) and narrows the Discord skill requirement to the token key. In addition to upgrading, users should rotate any Discord tokens that may have been exposed to read-scoped clients.

References:


CVE-2026-27007 — OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation

FieldDetail
CVSS4.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CWECWE-1254 (CWE-1254: Incorrect Comparison Logic Granularity)
Affected< 2026.2.15
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-xxvh-5hwj-42pp

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, normalizeForHash in src/agents/sandbox/config-hash.ts recursively sorted arrays that contained only primitive values. This made order-sensitive sandbox configuration arrays hash to the same value even when order changed. In OpenClaw sandbox flows, this hash is used to decide whether existing sandbox containers should be recreated. As a result, order-only config changes (for example Docker dns and binds array order) could be treated as unchanged and stale containers could be reused. This is a configuration integrity issue affecting sandbox recreation behavior. Starting in version 2026.2.15, array ordering is preserved during hash normalization; only object key ordering remains normalized for deterministic hashing.

References:


CVE-2026-27576 — OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs

FieldDetail
CVSS4.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CWECWE-400 (CWE-400: Uncontrolled Resource Consumption)
Affected< 2026.2.19
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-cxpw-2g23-2vgw

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very large prompt text blocks and can assemble oversized prompt payloads before forwarding them to chat.send. Because ACP runs over local stdio, this mainly affects local ACP clients (for example IDE integrations) that send unusually large inputs. This issue has been fixed in version 2026.2.19.

References:


CVE-2026-27485 — OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection

FieldDetail
CVSS4.6 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CWECWE-61 (CWE-61: UNIX Symbolic Link (Symlink) Following)
Affected< 2026.2.19
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-r6h2-5gqq-v5v6

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, skills/skill-creator/scripts/package_skill.py (a local helper script used when authors package skills) previously followed symlinks while building .skill archives. If an author runs this script on a crafted local skill directory containing symlinks to files outside the skill root, the resulting archive can include unintended file contents. If exploited, this vulnerability can lead to potential unintentional disclosure of local files from the packaging machine into a generated .skill artifact, but requires local execution of the packaging script on attacker-controlled skill contents. This issue has been fixed in version 2026.2.18.

References:


CVE-2026-27486 — OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup

FieldDetail
CVSS4.3 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H
CWECWE-283 (CWE-283: Unverified Ownership)
Affected< 2026.2.14
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-jfv4-h8mc-jcp8

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below of the OpenClaw CLI, the process cleanup uses system-wide process enumeration and pattern matching to terminate processes without verifying if they are owned by the current OpenClaw process. On shared hosts, unrelated processes can be terminated if they match the pattern. The CLI runner cleanup helpers can kill processes matched by command-line patterns without validating process ownership. This issue has been fixed in version 2026.2.14.

References:


CVE-2026-24764 — OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions

FieldDetail
CVSS3.7 (LOW) — CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
CWECWE-74 (CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')), CWE-94 (CWE-94: Improper Control of Generation of Code ('Code Injection'))
Affected< 2026.2.3
Vendor/Productclawdbot / clawdbot
AdvisoryGHSA-782p-5fr5-7fj8

OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions 2026.2.2 and below, when the Slack integration is enabled, channel metadata (topic/description) can be incorporated into the model's system prompt. Prompt injection is a documented risk for LLM-driven systems. This issue increases the injection surface by allowing untrusted Slack channel metadata to be treated as higher-trust system input. This issue has been fixed in version 2026.2.3.

Naming note: Uses old name clawdbot/clawdbot as vendor/product. References:


CVE-2026-27484 — OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows

FieldDetail
CVSS2.3 (LOW) — CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CWECWE-862 (CWE-862: Missing Authorization)
Affected< 2026.2.18
Vendor/Productopenclaw / openclaw
AdvisoryGHSA-wh94-p5m6-mr7j

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action handling (timeout, kick, ban) uses sender identity from request parameters in tool-driven flows, instead of trusted runtime sender context. In setups where Discord moderation actions are enabled and the bot has the necessary guild permissions, a non-admin user can request moderation actions by spoofing sender identity fields. This issue has been fixed in version 2026.2.18.

References:



⏳ CVE Publication Pipeline

Of 11 GHSAs with CVE IDs, 11 are fully published and 0 remain RESERVED.

CVE IDStatecvelistV5GHSA PublishedCNA
CVE-2026-24763PUBLISHED2026-02-02GitHub_M
CVE-2026-25157PUBLISHED2026-02-02GitHub_M
CVE-2026-25253PUBLISHED2026-02-02mitre
CVE-2026-26317PUBLISHED2026-02-18GitHub_M
CVE-2026-26328PUBLISHED2026-02-18GitHub_M
CVE-2026-28452PUBLISHED2026-02-18VulnCheck
CVE-2026-28458PUBLISHED2026-02-17VulnCheck
CVE-2026-28469PUBLISHED2026-02-18VulnCheck
CVE-2026-28478PUBLISHED2026-02-18VulnCheck
CVE-2026-28480PUBLISHED2026-02-18VulnCheck
CVE-2026-29612PUBLISHED2026-02-18VulnCheck

🔑 Key Insights

InsightDetail
Dominant Weakness52% of categorized issues relate to Allowlist Bypass (67/130)
V5 Sync Rate11/11 CVE IDs (100%) have full cvelistV5 records
Advisory Velocity158 security advisories across 2026-02-02 → 2026-03-09
Top Severity0 Critical + 51 High = 51 high-impact issues (32%)

Vulnerability Categories

CategoryCountExamples
OS Command Injection (CWE-78)12PATH injection, SSH command injection, Docker exec, keychain writes
Path Traversal (CWE-22)8MEDIA: paths, plugin install, browser downloads, Zip Slip, transcript paths
SSRF5Image tool fetch, Feishu extension, attachment/media URLs, IPv6 bypass
Auth Bypass / Missing Auth11WebSocket config.apply, webhook verification, browser relay, sandbox bridge
Allowlist Bypass67Telegram usernames, Matrix displayName, Slack DM, Twitch, voice-call
Injection (XSS/CSRF/Prompt)21XSS in Control UI, prompt injection via Slack/CWD/logs, CSRF
Denial of Service6Unbounded media fetch, webhook body buffering, archive expansion

📋 All Security Advisories (158)

Critical & High Severity

GHSACVESeverityTitlePublished
GHSA-6mgf-v5j7-45crHighOpenClaw: fetch-guard forwards custom authorization headers across cross-origin redirects2026-03-09
GHSA-rchv-x836-w7xpHighOpenClaw's dashboard leaked gateway auth material via browser URL/query and localStorage2026-03-09
GHSA-3jx4-q2m7-r496HighOpenClaw: Hardlink alias checks could bypass workspace-only file boundaries in specific configurations2026-03-04
GHSA-vvjh-f6p9-5vcfHighOpenClaw Canvas Authentication Bypass Vulnerability2026-03-04
GHSA-x2ff-j5c2-ggprHighOpenClaw: Slack interactive callbacks could skip configured sender checks in some shared-workspace flows2026-03-04
GHSA-2ch6-x3g4-7759HighOpenClaw's commands.allowFrom sender authorization accepted conversation identifiers via ctx.From2026-03-03
GHSA-jj82-76v6-933rHighOpenClaw's exec allowlist wrapper analysis did not unwrap env/shell dispatch chains2026-03-03
GHSA-m8v2-6wwh-r4gcHighOpenClaw's sandbox bind validation could bypass allowed-root and blocked-path checks via symlink-parent missing-leaf paths2026-03-03
GHSA-jxrq-8fm4-9p58HighOpenClaw: Zip extraction symlink traversal could write outside destination2026-03-03
GHSA-659f-22xc-98f2HighOpenClaw hook transform path containment missed symlink-resolved escapes2026-03-03
GHSA-4gc7-qcvf-38wgHighIn OpenClaw, manually adding sort to tools.exec.safeBins could bypass allowlist approval via --compress-program2026-03-03
GHSA-w7j5-j98m-w679HighOpenClaw has multiple E2E/test Dockerfiles that run all processes as root2026-03-03
GHSA-7ff8-xjh3-mgh6HighOpenClaw's non-default autoAllowSkills setting could bypass on-miss exec prompt2026-03-03
GHSA-xgf2-vxv2-rrmgHighOpenClaw's shell startup env injection bypasses system.run allowlist intent (RCE class)2026-03-03
GHSA-w9cg-v44m-4qv8HighOpenClaw affected by BASH_ENV / ENV startup-file injection into spawned shell commands2026-03-03
GHSA-xmv6-r34m-62p4HighOpenClaw: Sandbox media fallback tmp symlink alias bypass allows host file reads outside sandboxRoot2026-03-03
GHSA-g75x-8qqm-2vxpHighOpenClaw's tools.exec.safeBins PATH-hijack allowed trojan binaries to bypass allowlist checks2026-03-03
GHSA-vffc-f7r7-rx2wHighOpenClaw Improperly Neutralizes Line Breaks in systemd Unit Generation Enables Local Command Execution (Linux)2026-03-03
GHSA-pj5x-38rw-6fphHighOpenClaw has a Command Injection via unescaped environment assignments in Windows Scheduled Task script generation2026-03-03
GHSA-3c6h-g97w-fg78HighOpenClaw's tools.exec.safeBins sort long-option abbreviation bypass can skip exec approval in allowlist mode2026-03-03
GHSA-mqr9-vqhq-3jxwHighOpenClaw Windows Scheduled Task script generation allowed local command injection via unsafe cmd argument handling2026-03-03
GHSA-p4wh-cr8m-gm6cHighOpenClaw: shell-env trusted-prefix fallback allowed attacker-controlled binary execution via $SHELL2026-03-03
GHSA-5gj7-jf77-q2q2HighOpenClaw: safeBins static default trusted dirs allow writable-dir binary hijack (jq)2026-03-03
GHSA-474h-prjg-mmw3HighOpenClaw: Sandboxed sessions_spawn(runtime="acp") bypassed sandbox inheritance and allowed host ACP initialization2026-03-03
GHSA-r54r-wmmq-mh84HighOpenClaw: ZIP extraction race could write outside destination via parent symlink rebind2026-03-03
GHSA-8mvx-p2r9-r375HighOpenClaw's web tools strict URL guard could lose DNS pinning when env proxy is configured2026-03-03
GHSA-cfvj-7rx7-fc7cHighOpenClaw: stageSandboxMedia destination symlink traversal can overwrite files outside sandbox workspace2026-03-03
GHSA-x9cf-3w63-rpq9HighOpenClaw vulnerable to sensitive file disclosure via stageSandboxMedia2026-03-03
GHSA-8fmp-37rc-p5g7HighOpenClaw's config env vars allowed startup env injection into service runtime2026-03-03
GHSA-6rcp-vxwf-3mfpHighOpenClaw's system.run shell-wrapper positional argv carriers could execute hidden commands under misleading approval text2026-03-03
GHSA-mwcg-wfq3-4gjcHighOpenClaw's system.run approval TOCTOU via mutable symlink cwd target on node host2026-03-03
GHSA-rq6g-px6m-c248CVE-2026-28469HighOpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting2026-02-18
GHSA-3fqr-4cg8-h96qCVE-2026-26317HighOpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints2026-02-18
GHSA-q447-rj3r-2cghCVE-2026-28478HighOpenClaw affected by denial of service via unbounded webhook request body buffering2026-02-18
GHSA-mr32-vwc2-5j6hCVE-2026-28458HighOpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access2026-02-17
GHSA-q284-4pvr-m585CVE-2026-25157HighOpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand2026-02-02
GHSA-g8p2-7wf7-98mqCVE-2026-25253HighOpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl2026-02-02
GHSA-mc68-q9jw-2h3vCVE-2026-24763HighOpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable2026-02-02
GHSA-r2c6-8jc8-g32wHighDuplicate Advisory: 1-Click RCE via Authentication Token Exfiltration From gatewayUrl2026-02-02

Medium Severity

GHSACVESeverityTitlePublished
GHSA-9q36-67vc-rrwgMediumOpenClaw: Sandboxed /acp spawn requests could initialize host ACP sessions2026-03-09
GHSA-9q2p-vc84-2rwmMediumOpenClaw: system.run allow-always persistence included shell-commented payload tails2026-03-09
GHSA-hfpr-jhpq-x4rmMediumOpenClaw: operator.write chat.send could reach admin-only config writes2026-03-09
GHSA-r6qf-8968-wj9qMediumOpenClaw: system.run wrapper-depth boundary could skip shell approval gating2026-03-09
GHSA-pjvx-rx66-r3fgMediumOpenClaw: Cross-account sender authorization expansion in /allowlist ... --store account scoping2026-03-09
GHSA-3h2q-j2v4-6w5rMediumOpenClaw's system.run allowlist approval parsing missed PowerShell encoded-command wrappers2026-03-09
GHSA-j425-whc4-4jgcMediumOpenClaw's system.run env override filtering allowed dangerous helper-command pivots2026-03-09
GHSA-6rmx-gvvg-vh6jMediumOpenClaw's hooks count non-POST requests toward auth lockout2026-03-09
GHSA-jwf4-8wf4-jf2mMediumOpenClaw: BlueBubbles (optional plugin) pairing/allowlist mismatch when allowFrom is empty2026-03-04
GHSA-jjgj-cpp9-cvpvMediumOpenClaw Vulnerable to Local File Exfiltration via MCP Tool Result MEDIA: Directive Injection2026-03-04
GHSA-q6qf-4p5j-r25gMediumOpenClaw's image tool bypasses tools.fs.workspaceOnly on sandbox mount paths and exfiltrates out-of-workspace images2026-03-04
GHSA-4rqq-w8v4-7p47MediumOpenClaw has incomplete IPv4 special-use SSRF blocking in web fetch guard2026-03-04
GHSA-9mph-4f7v-fmvhMediumOpenClaw has agent avatar symlink traversal in gateway session metadata2026-03-04
GHSA-f6h3-846h-2r8wMediumOpenClaw's elevated allowFrom accepted broader identity signals than specified within sender-scoped authorization2026-03-04
GHSA-8cp7-rp8r-mg77MediumOpenClaw has SSRF guard bypass via IPv6 transition over ISATAP2026-03-04
GHSA-gq83-8q7q-9hfxMediumOpenClaw's serialize sandbox registry writes to prevent races and delete-rollback corruption2026-03-03
GHSA-rv2q-f2h5-6xmgMediumOpenClaw's Node role device-identity bypass allows unauthorized node.event injection2026-03-03
GHSA-fg3m-vhrr-8gj6MediumOpenClaw has Windows Lobster shell fallback command injection in constrained fallback path2026-03-03
GHSA-534w-2vm4-89xrMediumOpenClaw's Zalo group sender allowlist bypass permits unauthorized GROUP dispatch2026-03-03
GHSA-cjv3-m589-v3rxMediumOpenClaw has Canvas route hardening for mixed-trust deployments2026-03-03
GHSA-wpph-cjgr-7c39MediumOpenClaw's typed sender-key matching for toolsBySender prevents identity-collision policy bypass2026-03-03
GHSA-792q-qw95-f446MediumOpenClaw's Signal reaction-only status events could, in limited cases, be enqueued before access checks2026-03-03
GHSA-r9q5-c7qc-p26wMediumOpenClaw's Nextcloud Talk webhook replay could trigger duplicate inbound processing2026-03-03
GHSA-gw85-xp4q-5gp9MediumOpenClaw's Synology Chat dmPolicy=allowlist failed open on empty allowedUserIds, allowing unauthorized agent dispatch2026-03-03
GHSA-25pw-4h6w-qwvmMediumOpenClaw has a BlueBubbles group allowlist mismatch via DM pairing-store fallback2026-03-03
GHSA-796m-2973-wc5qMediumOpenClaw has exec allowlist/safeBins policy-runtime mismatch via env -S wrapper interpretation2026-03-03
GHSA-jmmg-jqc7-5qf4MediumOpenClaw's browser-origin WebSocket auth hardening gap could enable loopback password brute-force chains2026-03-03
GHSA-2rgf-hm63-5qphMediumOpenClaw improperly parses X-Forwarded-For behind trusted proxies allows client IP spoofing in security decisions2026-03-03
GHSA-27cr-4p5m-74rjMediumOpenClaw has a workspace-only sandbox guard mismatch for @-prefixed absolute paths2026-03-03
GHSA-r294-2894-92j3MediumOpenClaw has stored XSS in exported session HTML viewer via markdown/raw-HTML rendering2026-03-03
GHSA-v3j7-34xh-6g3wMediumOpenClaw Loopback CDP probe can leak Gateway token to local listener2026-03-03
GHSA-4cqv-h74h-93j4MediumOpenClaw has a Discord allowFrom slug-collision authorization bypass2026-03-03
GHSA-3cvx-236h-m9fjMediumOpenClaw has an opt-in insecure Control UI auth over plaintext HTTP could allow privileged access2026-03-03
GHSA-h97f-6pqj-q452MediumOpenClaw has a IPv6 multicast SSRF classifier bypass2026-03-03
GHSA-3x3x-h76w-hp98MediumOpenClaw exec allowlist safeBins short-option bypass could permit arbitrary file write2026-03-03
GHSA-pfv7-rr5m-qmv6MediumOpenClaw has auth inconsistency on local Browser Extension Relay /extension endpoint2026-03-03
GHSA-j4xf-96qf-rx69MediumOpenClaw has a Feishu allowFrom authorization bypass via display-name collision2026-03-03
GHSA-9p38-94jf-hgjjMediumOpenClaw has macOS system.run allowlist bypass via quoted command substitution2026-03-03
GHSA-5h2c-8v84-qpvrMediumOpenClaw shell-env fallback trusted startup env and could execute attacker-influenced login-shell paths2026-03-03
GHSA-ff98-w8hj-qrxfMediumOpenClaw plugin runtime command execution is part of trusted plugin boundary2026-03-03
GHSA-553v-f69r-656jMediumOpenClaw unpaired device identity can bypass operator pairing and self-assign operator scopes with shared auth2026-03-03
GHSA-45cg-2683-gfmqMediumOpenClaw browser navigation guard allowed non-network URL schemes, enabling authenticated browser-tool users to access file:// local files2026-03-03
GHSA-h9xm-j4qg-fvpgMediumOpenClaw: Experimental apply_patch may bypass workspace-only checks in opt-in sandbox mounts (off by default)2026-03-03
GHSA-j26j-7qc4-3mrfMediumOpenClaw: MS Teams fileConsent/invoke missing conversation binding allowed cross-conversation pending-upload consumption2026-03-03
GHSA-2hm8-rqrm-xfjqMediumOpenClaw's owner-only gateway tool access checks were incomplete in specific authenticated DM flows2026-03-03
GHSA-2mc2-g238-722jMediumOpenClaw affected by iMessage remote attachment SCP hardening (strict host-key checks and remoteHost validation)2026-03-03
GHSA-77hf-7fqf-f227MediumOpenClaw skills-install-download: tar.bz2 extraction bypassed archive safety parity checks (local DoS)2026-03-03
GHSA-wpg9-4g4v-f9rcMediumOpenClaw: Discord voice transcript owner-flag omission could expose owner-only tools in mixed-trust channels2026-03-03
GHSA-v865-p3gq-hw6mMediumOpenClaw has encoded-path auth bypass in plugin /api/channels route classification2026-03-03
GHSA-354r-7mfh-7rh2MediumOpenClaw: Discord DM reaction ingress missed dmPolicy/allowFrom checks in restricted setups2026-03-03
GHSA-3pxq-f3cp-jmxpMediumOpenClaw: Unified root-bound write hardening for browser output and related path-boundary flows2026-03-03
GHSA-h3rm-6x7g-882fMediumOpenClaw's Node system.run approval hardening wrapper semantic drift can execute unintended local scripts2026-03-03
GHSA-2858-xg23-26fpMediumOpenClaw: Node camera URL payload host-binding bypass allowed gateway fetch pivots2026-03-03
GHSA-x4vp-4235-65hgMediumOpenClaw has pre-auth webhook body parsing that can enable unauthenticated slow-request DoS2026-03-03
GHSA-56pc-6hvp-4gv4MediumOpenClaw vulnerable to arbitrary file read via $include directive2026-03-03
GHSA-9868-vxmx-w862MediumOpenClaw's system.run allowlist bypass via shell line-continuation command substitution2026-03-03
GHSA-f8mp-vj46-cq8vMediumOpenClaw's shell env fallback trusts unvalidated SHELL path from host environment2026-03-03
GHSA-qhrr-grqp-6x2gMediumOpenClaw's tools.exec.safeBins trusted PATH directories allowed binary shadowing in allowlist mode2026-03-03
GHSA-rm2p-j3r7-4x4jMediumOpenClaw's Slack reaction/pin sender-policy consistency issue in non-message ingress2026-03-03
GHSA-25gx-x37c-7pphMediumOpenClaw's andbox browser noVNC observer lacked VNC authentication2026-03-03
GHSA-jv6r-27ww-4gw4MediumOpenClaw DM pairing-store identities could satisfy group allowlist authorization2026-03-03
GHSA-ccg8-46r6-9qgjMediumOpenClaw's dispatch-wrapper depth-cap mismatch can bypass shell-wrapper approval gating in system.run allowlist mode2026-03-03
GHSA-mj5r-hh7j-4gxfCVE-2026-28480MediumOpenClaw Telegram allowlist authorization accepted mutable usernames2026-02-18
GHSA-h89v-j3x9-8wqjCVE-2026-28452MediumOpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR)2026-02-18
GHSA-w2cg-vxx6-5xjgCVE-2026-29612MediumOpenClaw: denial of service through large base64 media files allocating large buffers before limit checks2026-02-18
GHSA-g34w-4xqq-h79mCVE-2026-26328MediumOpenClaw iMessage group allowlist authorization inherited DM pairing-store identities2026-02-18

Low Severity

GHSACVESeverityTitlePublished
GHSA-vjp8-wprm-2jw9LowOpenClaw has cross-account DM pairing authorization bypass via unscoped pairing store access2026-03-04
GHSA-8mf7-vv8w-hjr2LowOpenClaw's tools.exec.safeBins generic fallback allowed interpreter-style inline payload execution in allowlist mode2026-03-03
GHSA-v6x2-2qvm-6gv8LowOpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback2026-03-03
GHSA-gcj7-r3hg-m7w6LowOpenClaw's voice-call Twilio replay dedupe now bound to authenticated webhook identity2026-03-03
GHSA-7qf6-h84j-8fq4LowOpenClaw: Microsoft Teams media fetch paths bypass shared SSRF guard model2026-03-03
GHSA-62f6-mrcj-v8h5LowOpenClaw's runtime /debug override path accepted prototype-reserved keys2026-03-03
GHSA-vvgp-4c28-m3jmLowOpenClaw has a Trusted-proxy Control UI pairing bypass which allows unpaired node sessions2026-03-03
GHSA-chm2-m3w2-wcxmLowOpenClaw Google Chat spoofing access with allowlist authorized mutable email principal despite sender-ID mismatch2026-02-17

Repo-Only Advisories (~45 more)

These advisories are listed on the repo security page but not yet indexed in the GitHub Advisory Database. See the full advisory list for details.

Show 45 repo-only advisories
GHSASeverityTitlePublished
GHSA-6f6j-wx9w-ff4jHighACPX Windows wrapper shell fallback allowed cwd injection in specific paths2026-03-02
GHSA-9f72-qcpw-2hxcHighNative prompt image auto-load did not honor tools.fs.workspaceOnly in sandboxed runs2026-02-25
GHSA-gp3q-wpq4-5c5hHighLINE group allowlist scope mismatch with DM pairing-store entries2026-02-26
GHSA-hwpq-rrpf-pgcqHighsystem.run approval identity mismatch could execute a different binary than displayed2026-02-26
GHSA-jr6x-2q95-fh2gHighAuthorization mismatch allowed write-scope agent runs to reach owner-only tools2026-03-02
GHSA-mfg5-7q5g-f37jHighvoice-call media stream validated streams after upgrade, which could allow pre-start unauthenticated sockets to increase resource pressure2026-02-23
GHSA-mgrq-9f93-wpp5Highworkspace path guard bypass on non-existent out-of-root symlink leaf2026-02-26
GHSA-mwxv-35wr-4vvjHighGateway plugin auth bypass via encoded dot-segment traversal in protected /api/channels paths2026-02-26
GHSA-p7gr-f84w-hqg5HighSandboxed sessions_spawn now enforces sandbox inheritance for cross-agent spawns2026-03-02
GHSA-q399-23r3-hfx4Highsystem.run approvals did not bind PATH-token executable identity, enabling post-approval executable rebind2026-03-02
GHSA-qcc4-p59m-p54mHighSandbox dangling-symlink alias handling could bypass workspace-only write boundary2026-02-26
GHSA-r65x-2hqr-j5hfHighNode reconnect metadata spoofing could bypass platform-based node command policy2026-02-26
GHSA-2ww6-868g-2c56MediumHTML injection via unvalidated image MIME type in data-URL interpolation2026-02-24
GHSA-33hm-cq8r-wc49MediumTemporary path handling could write outside OpenClaw temp boundary2026-02-25
GHSA-36h3-7c54-j27rMediumBrowser trace/download path symlink escape in temp output handling2026-02-26
GHSA-392f-ggf5-fp3cMediumUnicode canonicalization drift in node metadata policy classification could broaden node allowlists2026-03-02
GHSA-48wf-g7cp-gr3mMediumallowlist exec-guard bypass via env -S2026-02-24
GHSA-6x2m-hqfw-hvpjMediumNode exec approvals could be replayed across nodes2026-02-24
GHSA-7jx5-9fjg-hp4mMediumACP permission auto-approval bypass via untrusted tool metadata2026-02-24
GHSA-7xmq-g46g-f8pvMediumSandbox media TOCTOU could read files outside sandbox root2026-03-02
GHSA-8g75-q649-6pv6Mediumsystem.run approvals did not bind mutable script operands across approval and execution2026-03-10
GHSA-8j2w-6fmm-m587Medium/api/channels gateway-auth boundary bypass via path canonicalization mismatch2026-02-26
GHSA-8j9w-9pm5-pv8mMediumDUPLICATE of GHSA-3c6h-g97w-fg78: safeBins denied flags can be bypassed via GNU long-option abbreviations2026-02-24
GHSA-8m9v-xpgf-g99mMediumUnauthorized sender bypass in stop triggers and /models command authorization2026-03-02
GHSA-f7ww-2725-qvw2MediumNode system.run approval bypass via parent-symlink cwd rebind2026-02-26
GHSA-fgvx-58p6-gjwcMediumGateway agents.files symlink escape allowed out-of-workspace file read/write2026-02-26
GHSA-fqcm-97m6-w7rmMediumMessage action attachment hydration bypasses local media root checks when sandboxRoot is unset2026-02-25
GHSA-g7cr-9h7q-4qxqMediumMS Teams sender allowlist bypass when route allowlist is configured and sender allowlist is empty2026-03-11
GHSA-g99v-8hwm-g76gMediumweb_search citation redirect SSRF via private-network-allowing policy2026-03-02
GHSA-gwqp-86q6-w47gMediumexec allow-always can be bypassed via unrecognized multiplexer shell wrappers (busybox/toybox sh -c)2026-02-24
GHSA-h656-5vcf-cm23MediumTelegram: Unauthorized Senders Trigger Media Download and Disk Write Before Access Check2026-02-25
GHSA-hjvp-qhm6-wrh2MediumNode system.run approval context-binding weakness in approval-enabled host=node flows2026-02-26
GHSA-qj22-xqjr-v83vMediumTelegram message_reaction authorization bypass allows unauthorized system-event injection2026-02-26
GHSA-rx3g-mvc3-qfjfMediumAvatar symlink traversal can expose out-of-workspace local files2026-02-23
GHSA-v8cg-4474-49v8MediumSlack system events bypass sender authorization in member and message subtype handlers2026-02-26
GHSA-vhwf-4x96-vqx2Mediumskills-install-download can be redirected outside the tools root by rebinding the validated base path2026-03-11
GHSA-vmqr-rc7x-3446MediumNon-default safeBins sort configuration can bypass intended allowlist approval constraints2026-02-23
GHSA-vpj2-69hf-rppwMediumBrowser control startup could continue unauthenticated after auth bootstrap failure2026-03-02
GHSA-vqx8-9xxw-f2m7Mediumvoice-call Twilio webhook replay could bypass manager dedupe because normalized event IDs were randomized per parse2026-02-24
GHSA-wr6m-jg37-68xhMediumUnbounded memory growth in Zalo webhook via query-string key churn (unauthenticated DoS)2026-03-02
GHSA-x82f-27x3-q89cMediumTOCTOU symlink race in writeFileWithinRoot could create or truncate files outside root boundaries2026-03-02
GHSA-2j9j-gf59-p4p5LowiOS deep link (openclaw://agent) can trigger gateway agent requests without local confirmation2026-02-24
GHSA-6g25-pc82-vfwpLowmacOS beta onboarding exposed PKCE verifier via OAuth state2026-02-26
GHSA-wm8r-w8pf-2v6wLowSignal group allowlist authorization bypass via DM pairing-store leakage2026-02-26
GHSA-ww6v-v748-x7g9Lowsandbox network isolation bypass via docker.network=container:2026-02-25

Naming Inconsistencies

The OpenClaw project has been renamed multiple times, causing inconsistencies across CVE records:

CVEvendorproductpackageURLDescription Names
CVE-2026-28363OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28466OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28474OpenClawnextcloud-talkpkg:npm/openclaw-nextcloud-talkOpenClaw
CVE-2026-28446OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28391OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28472OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28470OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-24763clawdbotclawdbotOpenClaw (formerly Clawdbot)
CVE-2026-25253OpenClawOpenClawpkg:npm/clawdbotOpenClaw / clawdbot / Moltbot
CVE-2026-28462OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28478OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28479OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-29609OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-26323openclawopenclawOpenClaw
CVE-2026-27001openclawopenclawOpenClaw
CVE-2026-28456OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28463OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28468OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-25593openclawopenclawOpenClaw
CVE-2026-28482OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28393OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28453OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28450OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28392OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28454OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28464OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28465OpenClawvoice-callpkg:npm/openclaw-voice-callOpenClaw
CVE-2026-28469OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-29613OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-29611OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-25157openclawopenclawOpenClaw
CVE-2026-27002openclawopenclawOpenClaw
CVE-2026-29610OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-26322openclawopenclawOpenClaw
CVE-2026-27487openclawopenclawOpenClaw
CVE-2026-25474openclawopenclawOpenClaw
CVE-2026-26319openclawopenclawOpenClaw
CVE-2026-26321openclawopenclawOpenClaw
CVE-2026-26316openclaw@openclaw/bluebubblesOpenClaw
CVE-2026-26324openclawopenclawOpenClaw
CVE-2026-28485OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28458OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-26325openclawopenclawOpenClaw
CVE-2026-28473OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-26317openclawclawdbotOpenClaw (formerly Clawdbot)
CVE-2026-26320openclawopenclawOpenClaw
CVE-2026-26329openclawopenclawOpenClaw
CVE-2026-26327openclawopenclawOpenClaw
CVE-2026-28459OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28447OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-27003openclawopenclawOpenClaw
CVE-2026-27004openclawopenclawOpenClaw
CVE-2026-27488openclawopenclawOpenClaw
CVE-2026-28394OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28467OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28480OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-27008openclawopenclawOpenClaw
CVE-2026-28486OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-29612OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-26972openclawopenclawOpenClaw
CVE-2026-28452OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-25475openclawopenclawOpenClaw
CVE-2026-26328openclawclawdbotOpenClaw (formerly Clawdbot)
CVE-2026-28448OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28395OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28451OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28475OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28471OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-29606OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28476OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28477OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-28481OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-27009openclawopenclawOpenClaw
CVE-2026-28457OpenClawOpenClawpkg:npm/openclawOpenClaw
CVE-2026-26326openclawopenclawOpenClaw
CVE-2026-27007openclawopenclawOpenClaw
CVE-2026-27576openclawopenclawOpenClaw
CVE-2026-27485openclawopenclawOpenClaw
CVE-2026-27486openclawopenclawOpenClaw
CVE-2026-24764clawdbotclawdbotOpenClaw (formerly Clawdbot)
CVE-2026-27484openclawopenclawOpenClaw

Data Sources

SourceURL
CVE List v5CVEProject/cvelistV5
GitHub Advisory DBgithub.com/advisories
Repo Security Tabopenclaw/openclaw/security
CVE Services APIhttps://cveawg.mitre.org/api/cve-id/{CVE-ID}

Auto-generated by update_readme.py · Updated hourly via GitHub Actions
Data: ghsa-advisories.json · cves.json · cve-pipeline-status.json

Maintained by Jerry Gamblin · OpenClawCVEs