Skip to content

jgamblin/OpenClawCVEs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

adeec39 · Mar 12, 2026

History

364 Commits
Mar 5, 2026
Mar 12, 2026
Feb 28, 2026
Feb 28, 2026
Feb 19, 2026
Mar 12, 2026
Feb 28, 2026
Feb 19, 2026
Mar 12, 2026
Feb 19, 2026
Mar 12, 2026
Mar 12, 2026
Mar 12, 2026
Mar 12, 2026
Mar 11, 2026
Feb 19, 2026
Mar 5, 2026

Repository files navigation

🛡️ OpenClaw CVE & Security Advisory Tracker

Total Advisories CVEs Assigned CVEs Published Reserved
Critical High Medium Low Awaiting CVE

An automated tracker that continuously monitors OpenClaw security advisories across the GitHub Advisory Database, repo-level security advisories, and the CVE V5 (cvelistV5) registry. Every hour it pulls the latest data, reconciles GHSA → CVE publication state, and regenerates this dashboard so you always have an up-to-date picture of the project's vulnerability landscape.

Last updated: 2026-03-11 18:24 UTC · MIT License · Full Advisory List · Security Policy · Data: cvelistV5 + Advisory DB · Updates hourly


Published CVEs · Pipeline · Advisories · Categories · Insights · Identity


🏗️ Project Identity

Field Value
Current Name OpenClaw
Previous Names Moltbot (second name), Clawdbot (original name)
Repository openclaw/openclaw
npm Package openclaw (formerly clawdbot)
Author Peter Steinberger (steipete)
Search terms for CVE discovery

To find all CVEs, search for: openclaw, clawdbot, moltbot, clawhub, pkg:npm/clawdbot, pkg:npm/openclaw


🚀 CVEs Published in cvelistV5 (14)

These CVEs have full records in the CVEProject/cvelistV5 repository:

CVE ID Severity CVSS Title CWE Published
CVE-2026-28363 Critical 9.9 In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be… CWE-184 2026-02-27
CVE-2026-28466 Critical 9.4 OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass CWE-863 2026-03-05
CVE-2026-28474 Critical 9.3 OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing CWE-863 2026-03-05
CVE-2026-28391 Critical 9.2 OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcement CWE-184 2026-03-05
CVE-2026-28446 Critical 9.2 OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching CWE-303 2026-03-05
CVE-2026-28472 Critical 9.2 OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake CWE-306 2026-03-05
CVE-2026-28470 Critical 9.2 OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double Quotes CWE-88 2026-03-05
CVE-2026-25253 High 8.8 OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl CWE-669 2026-02-01
CVE-2026-24763 High 8.8 OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable CWE-78 2026-02-02
CVE-2026-28462 High 8.7 OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths CWE-22 2026-03-05
CVE-2026-28478 High 8.7 OpenClaw affected by denial of service via unbounded webhook request body buffering CWE-770 2026-03-05
CVE-2026-28479 High 8.7 OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration CWE-327 2026-03-05
CVE-2026-29609 High 8.7 OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media Fetch CWE-770 2026-03-05
CVE-2026-32062 High 8.7 OpenClaw 2026.2.21-2 < 2026.2.22 - Unauthenticated WebSocket Resource Exhaustion via Media Stream CWE-770 2026-03-11
CVE-2026-32060 High 8.7 OpenClaw < 2026.2.14 - Path Traversal in apply_patch via Crafted Paths CWE-22 2026-03-11
CVE-2026-32059 High 8.7 OpenClaw's tools.exec.safeBins sort long-option abbreviation bypass can skip exec approval in allowlist mode CWE-863 2026-03-11
CVE-2026-26323 High 8.6 OpenClaw has a command injection in maintainer clawtributors updater CWE-78 2026-02-19
CVE-2026-27001 High 8.6 OpenClaw: Unsanitized CWD path injection into LLM prompts CWE-77 2026-02-19
CVE-2026-28456 High 8.6 OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path Handling CWE-427 2026-03-05
CVE-2026-28463 High 8.6 OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist CWE-78 2026-03-05
CVE-2026-28468 High 8.5 OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server CWE-306 2026-03-05
CVE-2026-25593 High 8.4 OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply CWE-78, CWE-306 2026-02-06
CVE-2026-28482 High 8.4 OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters CWE-22 2026-03-05
CVE-2026-28393 High 8.3 OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal CWE-427 2026-03-05
CVE-2026-28450 High 8.3 OpenClaw < 2026.2.12 - Unauthenticated Profile Tampering via Nostr Plugin HTTP Endpoints CWE-306 2026-03-05
CVE-2026-28453 High 8.3 OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction CWE-22 2026-03-05
CVE-2026-28392 High 8.2 OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages CWE-863 2026-03-05
CVE-2026-28454 High 8.2 OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram Webhook CWE-345 2026-03-05
CVE-2026-28469 High 8.2 OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting CWE-639 2026-03-05
CVE-2026-28465 High 8.2 OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers CWE-345 2026-03-05
CVE-2026-28464 High 8.2 OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication CWE-208 2026-03-05
CVE-2026-29611 High 8.2 OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media Handling CWE-73 2026-03-05
CVE-2026-29613 High 8.2 OpenClaw < 2026.2.12 - Webhook Authentication Bypass via Loopback remoteAddress Trust CWE-306 2026-03-05
CVE-2026-25157 High 7.8 OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand CWE-78 2026-02-04
CVE-2026-27002 High 7.7 OpenClaw: Docker container escape via unvalidated bind mount config injection CWE-250 2026-02-19
CVE-2026-29610 High 7.7 OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling CWE-427 2026-03-05
CVE-2026-26322 High 7.6 OpenClaw Gateway tool allowed unrestricted gatewayUrl override CWE-918 2026-02-19
CVE-2026-27487 High 7.6 OpenClaw: Prevent shell injection in macOS keychain credential write CWE-78 2026-02-21
CVE-2026-26321 High 7.5 OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension CWE-22 2026-02-19
CVE-2026-25474 High 7.5 OpenClaw has a Telegram webhook request forgery (missing channels.telegram.webhookSecret) → auth bypass CWE-345 2026-02-19
CVE-2026-26319 High 7.5 OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests CWE-306 2026-02-19
CVE-2026-26316 High 7.5 OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust CWE-863 2026-02-19
CVE-2026-26324 High 7.5 OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable) CWE-918 2026-02-19
CVE-2026-28485 High 7.5 OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints CWE-306 2026-03-05
CVE-2026-28458 High 7.4 OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access CWE-306 2026-03-05
CVE-2026-26325 High 7.2 OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals CWE-284 2026-02-19
CVE-2026-28473 High 7.2 OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command CWE-863 2026-03-05
CVE-2026-26320 High 7.1 OpenClaw macOS deep link confirmation truncation can conceal executed agent message CWE-451 2026-02-19
CVE-2026-26317 High 7.1 OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints CWE-352 2026-02-19
CVE-2026-26327 High 7.1 OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning CWE-345 2026-02-19
CVE-2026-26329 High 7.1 OpenClaw has a path traversal in browser upload allows local file read CWE-22 2026-02-19
CVE-2026-28459 High 7.1 OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile Path CWE-73 2026-03-05
CVE-2026-28447 High 7 OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package Name CWE-22 2026-03-05
CVE-2026-27004 Medium 6.9 OpenClaw session tool visibility hardening and Telegram webhook secret fallback CWE-209, CWE-346 2026-02-19
CVE-2026-27003 Medium 6.9 OpenClaw: Telegram bot token exposure via logs CWE-522 2026-02-19
CVE-2026-27488 Medium 6.9 OpenClaw hardened cron webhook delivery against SSRF CWE-918 2026-02-21
CVE-2026-28394 Medium 6.9 OpenClaw < 2026.2.15 - Denial of Service via Unbounded Response Parsing in web_fetch Tool CWE-770 2026-03-05
CVE-2026-28467 Medium 6.9 OpenClaw < 2026.2.2 - SSRF via Attachment Media URL Hydration CWE-918 2026-03-05
CVE-2026-28480 Medium 6.9 OpenClaw Telegram allowlist authorization accepted mutable usernames CWE-290 2026-03-05
CVE-2026-32063 Medium 6.9 OpenClaw Improperly Neutralizes Line Breaks in systemd Unit Generation Enables Local Command Execution (Linux) CWE-77 2026-03-11
CVE-2026-27008 Medium 6.8 OpenClaw hardened the skill download target directory validation CWE-73 2026-02-19
CVE-2026-28486 Medium 6.8 OpenClaw 2026.1.16-2 < 2026.2.14 - Path Traversal (Zip Slip) in Archive Extraction via Installation Commands CWE-22 2026-03-05
CVE-2026-29612 Medium 6.8 OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding CWE-770 2026-03-05
CVE-2026-26972 Medium 6.7 OpenClaw has a Path Traversal in Browser Download Functionality CWE-22 2026-02-19
CVE-2026-28452 Medium 6.7 OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) CWE-770 2026-03-05
CVE-2026-32061 Medium 6.7 OpenClaw < 2026.2.17 - Arbitrary File Read via $include Directive Path Traversal CWE-22 2026-03-11
CVE-2026-25475 Medium 6.5 OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction CWE-200, CWE-22 2026-02-04
CVE-2026-26328 Medium 6.5 OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities CWE-284, CWE-863 2026-02-19
CVE-2026-28451 Medium 6.3 OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching CWE-918 2026-03-05
CVE-2026-28448 Medium 6.3 OpenClaw 2026.1.29 < 2026.2.1 - Authorization Bypass in Twitch Plugin allowFrom Access Control CWE-285 2026-03-05
CVE-2026-28395 Medium 6.3 OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrl CWE-1327 2026-03-05
CVE-2026-28471 Medium 6.3 OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin CWE-287 2026-03-05
CVE-2026-28475 Medium 6.3 OpenClaw < 2026.2.13 - Timing Attack via Hook Token Comparison CWE-208 2026-03-05
CVE-2026-28476 Medium 6.3 OpenClaw < 2026.2.14 - Server-Side Request Forgery in Tlon Extension Authentication CWE-918 2026-03-05
CVE-2026-29606 Medium 6.3 OpenClaw < 2026.2.14 - Webhook Signature Verification Bypass via ngrok Loopback Compatibility CWE-306 2026-03-05
CVE-2026-28477 Medium 5.9 OpenClaw < 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow CWE-352 2026-03-05
CVE-2026-28481 Medium 5.9 OpenClaw < 2026.2.1 - Bearer Token Leakage via MS Teams Attachment Downloader Suffix Matching CWE-201 2026-03-05
CVE-2026-27009 Medium 5.8 OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection CWE-79 2026-02-19
CVE-2026-28457 Medium 5.6 OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter CWE-22 2026-03-05
CVE-2026-26326 Medium 5.3 OpenClaw skills.status could leak secrets to operator.read clients CWE-200 2026-02-19
CVE-2026-27007 Medium 4.8 OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation CWE-1254 2026-02-19
CVE-2026-27576 Medium 4.8 OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs CWE-400 2026-02-21
CVE-2026-27485 Medium 4.6 OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection CWE-61 2026-02-21
CVE-2026-27486 Medium 4.3 OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup CWE-283 2026-02-21
CVE-2026-24764 Low 3.7 OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions CWE-74, CWE-94 2026-02-19
CVE-2026-27484 Low 2.3 OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows CWE-862 2026-02-21
CVE-2026-30741 None A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6 2026-03-11
📖 Detailed CVE Analysis (click to expand)

CVE-2026-28363 — In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be…

Field Detail
CVSS 9.9 (CRITICAL) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE CWE-184 (CWE-184 Incomplete List of Disallowed Inputs)
Affected < 2026.2.23
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-3c6h-g97w-fg78

In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.


CVE-2026-28466 — OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass

Field Detail
CVSS 9.4 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CWE CWE-863 (Incorrect Authorization)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-gv46-4xfq-jv58

OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attackers with valid gateway credentials can inject approval control fields to execute arbitrary commands on connected node hosts, potentially compromising developer workstations and CI runners.

References:


CVE-2026-28474 — OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing

Field Detail
CVSS 9.3 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-863 (Incorrect Authorization)
Affected < 2026.2.6
Vendor/Product OpenClaw / nextcloud-talk
Advisory GHSA-r5h9-vjqc-hq3r

OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.

References:


CVE-2026-28391 — OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcement

Field Detail
CVSS 9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-184 (Incomplete List of Disallowed Inputs)
Affected < 2026.2.2
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-qj77-c3c8-9c3q

OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metacharacters like & or %...% to execute unapproved commands beyond the allowlisted operations.

References:


CVE-2026-28446 — OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching

Field Detail
CVSS 9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
CWE CWE-303 (Incorrect Implementation of Authentication Algorithm)
Affected < 2026.2.1
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-4rj2-gpmh-qq5x

OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.

References:


CVE-2026-28472 — OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake

Field Detail
CVSS 9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-306 (Missing Authentication for Critical Function)
Affected < 2026.2.2
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-rv39-79c4-7459

OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without providing device identity or pairing by exploiting the presence check instead of validation, potentially gaining operator access in vulnerable deployments.

References:


CVE-2026-28470 — OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double Quotes

Field Detail
CVSS 9.2 (CRITICAL) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-88 (Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'))
Affected < 2026.2.2
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-3hcm-ggvf-rch5

OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection by embedding unescaped $() or backticks inside double-quoted strings to execute unauthorized commands.

References:


CVE-2026-25253 — OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl

Field Detail
CVSS 8.8 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE CWE-669 (CWE-669 Incorrect Resource Transfer Between Spheres)
Affected < 2026.1.29
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-g8p2-7wf7-98mq

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

Naming note: Uses all three names in description. packageURL still references pkg:npm/clawdbot. References:


CVE-2026-24763 — OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable

Field Detail
CVSS 8.8 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected < 2026.1.29
Vendor/Product clawdbot / clawdbot
Advisory GHSA-mc68-q9jw-2h3v

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the container context. This vulnerability is fixed in 2026.1.29.

Naming note: Uses old name clawdbot/clawdbot as vendor/product. References:


CVE-2026-28462 — OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths

Field Detail
CVSS 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.13
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-gq9c-wg68-gwj2

OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/stop, POST /wait/download, and POST /download endpoints to write files outside intended temp roots.

References:


CVE-2026-28478 — OpenClaw affected by denial of service via unbounded webhook request body buffering

Field Detail
CVSS 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWE CWE-770 (Allocation of Resources Without Limits or Throttling)
Affected < 2026.2.13
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-q447-rj3r-2cgh

OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to webhook endpoints causing memory pressure and availability degradation.

References:


CVE-2026-28479 — OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration

Field Detail
CVSS 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-327 (Use of a Broken or Risky Cryptographic Algorithm)
Affected < 2026.2.15
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-fh3f-q9qw-93j9

OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache poisoning, allowing one sandbox configuration to be misinterpreted as another and enabling unsafe sandbox state reuse.

References:


CVE-2026-29609 — OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media Fetch

Field Detail
CVSS 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWE CWE-770 (Allocation of Resources Without Limits or Throttling)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-j27p-hq53-9wgc

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by serving oversized responses without content-length headers to cause availability loss.

References:


CVE-2026-32062 — OpenClaw 2026.2.21-2 < 2026.2.22 - Unauthenticated WebSocket Resource Exhaustion via Media Stream

Field Detail
CVSS 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWE CWE-770 (Allocation of Resources Without Limits or Throttling)
Affected < 2026.2.22
Vendor/Product openclaw / voice-call
Advisory GHSA-mfg5-7q5g-f37j

OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attackers can hold idle pre-authenticated sockets open to consume connection resources and degrade service availability for legitimate streams.

References:


CVE-2026-32060 — OpenClaw < 2026.2.14 - Path Traversal in apply_patch via Crafted Paths

Field Detail
CVSS 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-r5fq-947m-xm57

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containment, attackers can exploit crafted paths including directory traversal sequences or absolute paths to escape workspace boundaries and modify arbitrary files.

References:


CVE-2026-32059 — OpenClaw's tools.exec.safeBins sort long-option abbreviation bypass can skip exec approval in allowlist mode

Field Detail
CVSS 8.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-863 (Incorrect Authorization)
Affected < 2026.2.23
Vendor/Product openclaw / openclaw
Advisory GHSA-3c6h-g97w-fg78

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode.

References:


CVE-2026-26323 — OpenClaw has a command injection in maintainer clawtributors updater

Field Detail
CVSS 8.6 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected < >= 2026.1.8, < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-m7x8-2w3w-pr42

OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script scripts/update-clawtributors.ts. The issue affects contributors/maintainers (or CI) who run bun scripts/update-clawtributors.ts in a source checkout that contains a malicious commit author email (e.g. crafted @users[.]noreply[.]github[.]com values). Normal CLI usage is not affected (npm i -g openclaw): this script is not part of the shipped CLI and is not executed during routine operation. The script derived a GitHub login from git log author metadata and interpolated it into a shell command (via execSync). A malicious commit record could inject shell metacharacters and execute arbitrary commands when the script is run. Version 2026.2.14 contains a patch.

References:


CVE-2026-27001 — OpenClaw: Unsanitized CWD path injection into LLM prompts

Field Detail
CVSS 8.6 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-77 (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'))
Affected < 2026.2.15
Vendor/Product openclaw / openclaw
Advisory GHSA-2qj5-gwg2-xwc4

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose name contains control/format characters (for example newlines or Unicode bidi/zero-width markers), those characters could break the prompt structure and inject attacker-controlled instructions. Starting in version 2026.2.15, the workspace path is sanitized before it is embedded into any LLM prompt output, stripping Unicode control/format characters and explicit line/paragraph separators. Workspace path resolution also applies the same sanitization as defense-in-depth.

References:


CVE-2026-28456 — OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path Handling

Field Detail
CVSS 8.6 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-427 (Uncontrolled Search Path Element)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-v6c6-vqqg-w888

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process.

References:


CVE-2026-28463 — OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist

Field Detail
CVSS 8.6 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-xvhf-x56f-2hpp

OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized callers or prompt-injection attacks can exploit this to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode.

References:


CVE-2026-28468 — OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server

Field Detail
CVSS 8.5 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-306 (Missing Authentication for Critical Function)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-h9g4-589h-68xv

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts.

References:


CVE-2026-25593 — OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply

Field Detail
CVSS 8.4 (HIGH) — CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')), CWE-306 (CWE-306: Missing Authentication for Critical Function)
Affected < 2026.1.20
Vendor/Product openclaw / openclaw
Advisory GHSA-g55j-c2v4-pjcg

OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling command injection as the gateway user. This vulnerability is fixed in 2026.1.20.


CVE-2026-28482 — OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters

Field Detail
CVSS 8.4 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.12
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-5xfq-5mr7-426q

OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.

References:


CVE-2026-28393 — OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal

Field Detail
CVSS 8.3 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-427 (Uncontrolled Search Path Element)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-7xhj-55q9-pc3m

OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges.

References:


CVE-2026-28450 — OpenClaw < 2026.2.12 - Unauthenticated Profile Tampering via Nostr Plugin HTTP Endpoints

Field Detail
CVSS 8.3 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-306 (Missing Authentication for Critical Function)
Affected < 2026.2.12
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-mv9j-6xhh-g383

OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profiles without gateway authentication. Remote attackers can exploit these endpoints to read sensitive profile data, modify Nostr profiles, persist malicious changes to gateway configuration, and publish signed Nostr events using the bot's private key when the gateway HTTP port is accessible beyond localhost.

References:


CVE-2026-28453 — OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction

Field Detail
CVSS 8.3 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-p25h-9q54-ffvw

OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ../../ to write files outside extraction boundaries, potentially enabling configuration tampering and code execution.

References:


CVE-2026-28392 — OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages

Field Detail
CVSS 8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-863 (Incorrect Authorization)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-v773-r54f-q32w

OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privileged slash commands via direct message to bypass allowlist and access-group restrictions.

References:


CVE-2026-28454 — OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram Webhook

Field Detail
CVSS 8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-345 (Insufficient Verification of Data Authenticity)
Affected < 2026.2.2
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-fhvm-j76f-qmjv

OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can forge Telegram updates by spoofing message.from.id and chat.id fields to bypass sender allowlists and execute privileged bot commands.

References:


CVE-2026-28469 — OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting

Field Detail
CVSS 8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-639 (Authorization Bypass Through User-Controlled Key)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-rq6g-px6m-c248

OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.

References:


CVE-2026-28465 — OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers

Field Detail
CVSS 8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-345 (Insufficient Verification of Data Authenticity)
Affected < 2026.2.3
Vendor/Product OpenClaw / voice-call
Advisory GHSA-3m3q-x3gj-f79x

OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* headers in reverse-proxy configurations that implicitly trust these headers.

References:


CVE-2026-28464 — OpenClaw < 2026.2.12 - Timing Attack in Hooks Token Authentication

Field Detail
CVSS 8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-208 (Observable Timing Discrepancy)
Affected < 2026.2.12
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-jmm5-fvh5-gf4p

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually determine the authentication token.

References:


CVE-2026-29611 — OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media Handling

Field Detail
CVSS 8.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-73 (External Control of File Name or Path)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-rwj8-p9vq-25gv

OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBubblesMedia function fails to validate mediaPath parameters against an allowlist, enabling attackers to request sensitive files like /etc/passwd and exfiltrate them as media attachments.

References:


CVE-2026-29613 — OpenClaw < 2026.2.12 - Webhook Authentication Bypass via Loopback remoteAddress Trust

Field Detail
CVSS 8.2 (HIGH) — CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-306 (Missing Authentication for Critical Function)
Affected < 2026.2.12
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-xc7w-v5x6-cc87

OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint.

References:


CVE-2026-25157 — OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand

Field Detail
CVSS 7.8 (HIGH) — CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
CWE CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected < 2026.1.29
Vendor/Product openclaw / openclaw
Advisory GHSA-q284-4pvr-m585

OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-supplied project path in an error message. When the cd command failed, the unescaped path was interpolated directly into an echo statement, allowing arbitrary command execution on the remote SSH host. The parseSSHTarget function did not validate that SSH target strings could not begin with a dash. An attacker-supplied target like -oProxyCommand=... would be interpreted as an SSH configuration flag rather than a hostname, allowing arbitrary command execution on the local machine. This issue has been patched in version 2026.1.29.


CVE-2026-27002 — OpenClaw: Docker container escape via unvalidated bind mount config injection

Field Detail
CVSS 7.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-250 (CWE-250: Execution with Unnecessary Privileges)
Affected < 2026.2.15
Vendor/Product openclaw / openclaw
Advisory GHSA-w235-x559-36mg

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access. OpenClaw 2026.2.15 blocks dangerous sandbox Docker settings and includes runtime enforcement when building docker create args; config-schema validation for network=host, seccompProfile=unconfined, apparmorProfile=unconfined; and security audit findings to surface dangerous sandbox docker config. As a workaround, do not configure agents.*.sandbox.docker.binds to mount system directories or Docker socket paths, keep agents.*.sandbox.docker.network at none (default) or bridge, and do not use unconfined for seccomp/AppArmor profiles.

References:


CVE-2026-29610 — OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling

Field Detail
CVSS 7.7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-427 (Uncontrolled Search Path Element)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-jqpq-mgvm-f9r6

OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution.

References:


CVE-2026-26322 — OpenClaw Gateway tool allowed unrestricted gatewayUrl override

Field Detail
CVSS 7.6 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
CWE CWE-918 (CWE-918: Server-Side Request Forgery (SSRF))
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-g6q9-8fvw-f7rf

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied gatewayUrl without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets. This requires the ability to invoke tools that accept gatewayUrl overrides (directly or indirectly). In typical setups this is limited to authenticated operators, trusted automation, or environments where tool calls are exposed to non-operators. In other words, this is not a drive-by issue for arbitrary internet users unless a deployment explicitly allows untrusted users to trigger these tool calls. Some tool call paths allowed gatewayUrl overrides to flow into the Gateway WebSocket client without validation or allowlisting. This meant the host could be instructed to attempt connections to non-gateway endpoints (for example, localhost services, private network addresses, or cloud metadata IPs). In the common case, this results in an outbound connection attempt from the OpenClaw host (and corresponding errors/timeouts). In environments where the tool caller can observe the results, this can also be used for limited network reachability probing. If the target speaks WebSocket and is reachable, further interaction may be possible. Starting in version 2026.2.14, tool-supplied gatewayUrl overrides are restricted to loopback (on the configured gateway port) or the configured gateway.remote.url. Disallowed protocols, credentials, query/hash, and non-root paths are rejected.

References:


CVE-2026-27487 — OpenClaw: Prevent shell injection in macOS keychain credential write

Field Detail
CVSS 7.6 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
CWE CWE-78 (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-4564-pvr2-qq4h

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w .... Because OAuth tokens are user-controlled data, this created an OS command injection risk. This issue has been fixed in version 2026.2.14.

References:


CVE-2026-26321 — OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension

Field Detail
CVSS 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-8jpq-5h99-ff5r

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed sendMediaFeishu to treat attacker-controlled mediaUrl values as local filesystem paths and read them directly. If an attacker can influence tool calls (directly or via prompt injection), they may be able to exfiltrate local files by supplying paths such as /etc/passwd as mediaUrl. Upgrade to OpenClaw 2026.2.14 or newer to receive a fix. The fix removes direct local file reads from this path and routes media loading through hardened helpers that enforce local-root restrictions.

References:


CVE-2026-25474 — OpenClaw has a Telegram webhook request forgery (missing channels.telegram.webhookSecret) → auth bypass

Field Detail
CVSS 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE CWE-345 (CWE-345: Insufficient Verification of Data Authenticity)
Affected < 2026.2.1
Vendor/Product openclaw / openclaw
Advisory GHSA-mp5h-m6qj-6292

OpenClaw is a personal AI assistant. In versions 2026.1.30 and below, if channels.telegram.webhookSecret is not set when in Telegram webhook mode, OpenClaw may accept webhook HTTP requests without verifying Telegram’s secret token header. In deployments where the webhook endpoint is reachable by an attacker, this can allow forged Telegram updates (for example spoofing message.from.id). If an attacker can reach the webhook endpoint, they may be able to send forged updates that are processed as if they came from Telegram. Depending on enabled commands/tools and configuration, this could lead to unintended bot actions. Note: Telegram webhook mode is not enabled by default. It is enabled only when channels.telegram.webhookUrl is configured. This issue has been fixed in version 2026.2.1.

References:


CVE-2026-26319 — OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Requests

Field Detail
CVSS 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE CWE-306 (CWE-306: Missing Authentication for Critical Function)
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-4hg8-92x6-h2f3

OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated callers to forge Telnyx events. Telnyx webhooks are expected to be authenticated via Ed25519 signature verification. In affected versions, TelnyxProvider.verifyWebhook() could effectively fail open when no Telnyx public key was configured, allowing arbitrary HTTP POST requests to the voice-call webhook endpoint to be treated as legitimate Telnyx events. This only impacts deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is reachable from the attacker (for example, publicly exposed via a tunnel/proxy). The issue has been fixed in version 2026.2.14.

References:


CVE-2026-26316 — OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust

Field Detail
CVSS 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE CWE-863 (CWE-863: Incorrect Authorization)
Affected < 2026.2.13
Vendor/Product openclaw / @openclaw/bluebubbles
Advisory GHSA-pchc-86f6-8758

OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (127.0.0.1, ::1, ::ffff:127.0.0.1) even when the configured webhook secret was missing or incorrect. This does not affect the default iMessage integration unless BlueBubbles is installed and enabled. Version 2026.2.13 contains a patch. Other mitigations include setting a non-empty BlueBubbles webhook password and avoiding deployments where a public-facing reverse proxy forwards to a loopback-bound Gateway without strong upstream authentication.

References:


CVE-2026-26324 — OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable)

Field Detail
CVSS 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE CWE-918 (CWE-918: Server-Side Request Forgery (SSRF))
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-jrvc-8ff5-2f9f

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as 0:0:0:0:0:ffff:7f00:1 (which is 127.0.0.1). This could allow requests that should be blocked (loopback / private network / link-local metadata) to pass the SSRF guard. Version 2026.2.14 patches the issue.

References:


CVE-2026-28485 — OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints

Field Detail
CVSS 7.5 (HIGH) — CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
CWE CWE-306 (Missing Authentication for Critical Function)
Affected < 2026.2.12
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-qpjj-47vm-64pj

OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or local processes can execute arbitrary browser-context actions and access sensitive in-session data by sending requests to unauthenticated endpoints.

References:


CVE-2026-28458 — OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access

Field Detail
CVSS 7.4 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-306 (Missing Authentication for Critical Function)
Affected < 2026.2.1
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-mr32-vwc2-5j6h

OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopback and access sensitive data. Attackers can exploit this by connecting to ws://127.0.0.1:18792/cdp to steal session cookies and execute JavaScript in other browser tabs.

References:


CVE-2026-26325 — OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals

Field Detail
CVSS 7.2 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE CWE-284 (CWE-284: Improper Access Control)
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-h3f9-mjwj-w476

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between rawCommand and command[] in the node host system.run handler could cause allowlist/approval evaluation to be performed on one command while executing a different argv. This only impacts deployments that use the node host / companion node execution path (system.run on a node), enable allowlist-based exec policy (security=allowlist) with approval prompting driven by allowlist misses (for example ask=on-miss), allow an attacker to invoke system.run. Default/non-node configurations are not affected. Version 2026.2.14 enforces rawCommand/command[] consistency (gateway fail-fast + node host validation).

References:


CVE-2026-28473 — OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command

Field Detail
CVSS 7.2 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-863 (Incorrect Authorization)
Affected < 2026.2.2
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-mqpw-46fh-299h

OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval.resolve through an internal privileged gateway client, bypassing the operator.approvals permission check that protects direct RPC calls.

References:


CVE-2026-26320 — OpenClaw macOS deep link confirmation truncation can conceal executed agent message

Field Detail
CVSS 7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-451 (CWE-451: User Interface (UI) Misrepresentation of Critical Information)
Affected < >= 2026.2.6-0, < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-7q2j-c4q5-rm27

OpenClaw is a personal AI assistant. OpenClaw macOS desktop client registers the openclaw:// URL scheme. For openclaw://agent deep links without an unattended key, the app shows a confirmation dialog that previously displayed only the first 240 characters of the message, but executed the full message after the user clicked "Run." At the time of writing, the OpenClaw macOS desktop client is still in beta. In versions 2026.2.6 through 2026.2.13, an attacker could pad the message with whitespace to push a malicious payload outside the visible preview, increasing the chance a user approves a different message than the one that is actually executed. If a user runs the deep link, the agent may perform actions that can lead to arbitrary command execution depending on the user's configured tool approvals/allowlists. This is a social-engineering mediated vulnerability: the confirmation prompt could be made to misrepresent the executed message. The issue is fixed in 2026.2.14. Other mitigations include not approve unexpected "Run OpenClaw agent?" prompts triggered while browsing untrusted sites and usingunattended deep links only with a valid key for trusted personal automations.

References:


CVE-2026-26317 — OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints

Field Detail
CVSS 7.1 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
CWE CWE-352 (CWE-352: Cross-Site Request Forgery (CSRF))
Affected <= 2026.1.24-3
Vendor/Product openclaw / clawdbot
Advisory GHSA-3fqr-4cg8-h96q

OpenClaw is a personal AI assistant. Prior to 2026.2.14, browser-facing localhost mutation routes accepted cross-origin browser requests without explicit Origin/Referer validation. Loopback binding reduces remote exposure but does not prevent browser-initiated requests from malicious origins. A malicious website can trigger unauthorized state changes against a victim's local OpenClaw browser control plane (for example opening tabs, starting/stopping the browser, mutating storage/cookies) if the browser control service is reachable on loopback in the victim's browser context. Starting in version 2026.2.14, mutating HTTP methods (POST/PUT/PATCH/DELETE) are rejected when the request indicates a non-loopback Origin/Referer (or Sec-Fetch-Site: cross-site). Other mitigations include enabling browser control auth (token/password) and avoid running with auth disabled.

Naming note: Uses old name openclaw/clawdbot as vendor/product. References:


CVE-2026-26327 — OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning

Field Detail
CVSS 7.1 (HIGH) — CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-345 (CWE-345: Insufficient Verification of Data Authenticity)
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-pv58-549p-qh99

OpenClaw is a personal AI assistant. Discovery beacons (Bonjour/mDNS and DNS-SD) include TXT records such as lanHost, tailnetDns, gatewayPort, and gatewayTlsSha256. TXT records are unauthenticated. Prior to version 2026.2.14, some clients treated TXT values as authoritative routing/pinning inputs. iOS and macOS used TXT-provided host hints (lanHost/tailnetDns) and ports (gatewayPort) to build the connection URL. iOS and Android allowed the discovery-provided TLS fingerprint (gatewayTlsSha256) to override a previously stored TLS pin. On a shared/untrusted LAN, an attacker could advertise a rogue _openclaw-gw._tcp service. This could cause a client to connect to an attacker-controlled endpoint and/or accept an attacker certificate, potentially exfiltrating Gateway credentials (auth.token / auth.password) during connection. As of time of publication, the iOS and Android apps are alpha/not broadly shipped (no public App Store / Play Store release). Practical impact is primarily limited to developers/testers running those builds, plus any other shipped clients relying on discovery on a shared/untrusted LAN. Version 2026.2.14 fixes the issue. Clients now prefer the resolved service endpoint (SRV + A/AAAA) over TXT-provided routing hints. Discovery-provided fingerprints no longer override stored TLS pins. In iOS/Android, first-time TLS pins require explicit user confirmation (fingerprint shown; no silent TOFU) and discovery-based direct connects are TLS-only. In Android, hostname verification is no longer globally disabled (only bypassed when pinning).

References:


CVE-2026-26329 — OpenClaw has a path traversal in browser upload allows local file read

Field Detail
CVSS 7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-cv7m-c9jx-vg7q

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, authenticated attackers can read arbitrary files from the Gateway host by supplying absolute paths or path traversal sequences to the browser tool's upload action. The server passed these paths to Playwright's setInputFiles() APIs without restricting them to a safe root. An attacker must reach the Gateway HTTP surface (or otherwise invoke the same browser control hook endpoints); present valid Gateway auth (bearer token / password), as required by the Gateway configuration (In common default setups, the Gateway binds to loopback and the onboarding wizard generates a gateway token even for loopback); and have the browser tool permitted by tool policy for the target session/context (and have browser support enabled). If an operator exposes the Gateway beyond loopback (LAN/tailnet/custom bind, reverse proxy, tunnels, etc.), the impact increases accordingly. Starting in version 2026.2.14, the upload paths are now confined to OpenClaw's temp uploads root (DEFAULT_UPLOAD_DIR) and traversal/escape paths are rejected.

References:


CVE-2026-28459 — OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile Path

Field Detail
CVSS 7.1 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
CWE CWE-73 (External Control of File Name or Path)
Affected < 2026.2.12
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-64qx-vpxx-mvqf

OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service.

References:


CVE-2026-28447 — OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package Name

Field Detail
CVSS 7 (HIGH) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.1
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-qrq5-wjgg-rvqw

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing path traversal sequences like .. to write files outside the intended installation directory when victims run the plugins install command.

References:


CVE-2026-27004 — OpenClaw session tool visibility hardening and Telegram webhook secret fallback

Field Detail
CVSS 6.9 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-209 (CWE-209: Generation of Error Message Containing Sensitive Information), CWE-346 (CWE-346: Origin Validation Error)
Affected < 2026.2.15
Vendor/Product openclaw / openclaw
Advisory GHSA-6hf3-mhgc-cm65

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, in some shared-agent deployments, OpenClaw session tools (sessions_list, sessions_history, sessions_send) allowed broader session targeting than some operators intended. This is primarily a configuration/visibility-scoping issue in multi-user environments where peers are not equally trusted. In Telegram webhook mode, monitor startup also did not fall back to per-account webhookSecret when only the account-level secret was configured. In shared-agent, multi-user, less-trusted environments: session-tool access could expose transcript content across peer sessions. In single-agent or trusted environments, practical impact is limited. In Telegram webhook mode, account-level secret wiring could be missed unless an explicit monitor webhook secret override was provided. Version 2026.2.15 fixes the issue.

References:


CVE-2026-27003 — OpenClaw: Telegram bot token exposure via logs

Field Detail
CVSS 6.9 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-522 (CWE-522: Insufficiently Protected Credentials)
Affected < 2026.2.15
Vendor/Product openclaw / openclaw
Advisory GHSA-chf7-jq6g-qrwv

OpenClaw is a personal AI assistant. Telegram bot tokens can appear in error messages and stack traces (for example, when request URLs include https://api.telegram.org/bot<token>/...). Prior to version 2026.2.15, OpenClaw logged these strings without redaction, which could leak the bot token into logs, crash reports, CI output, or support bundles. Disclosure of a Telegram bot token allows an attacker to impersonate the bot and take over Bot API access. Users should upgrade to version 2026.2.15 to obtain a fix and rotate the Telegram bot token if it may have been exposed.

References:


CVE-2026-27488 — OpenClaw hardened cron webhook delivery against SSRF

Field Detail
CVSS 6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:L
CWE CWE-918 (CWE-918: Server-Side Request Forgery (SSRF))
Affected < 2026.2.19
Vendor/Product openclaw / openclaw
Advisory GHSA-w45g-5746-x9fp

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/gateway/server-cron.ts uses fetch() directly, so webhook targets can reach private/metadata/internal endpoints without SSRF policy checks. This issue was fixed in version 2026.2.19.

References:


CVE-2026-28394 — OpenClaw < 2026.2.15 - Denial of Service via Unbounded Response Parsing in web_fetch Tool

Field Detail
CVSS 6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWE CWE-770 (Allocation of Resources Without Limits or Throttling)
Affected < 2026.2.15
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-p536-vvpp-9mc8

OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability in the web_fetch tool that allows attackers to crash the Gateway process through memory exhaustion by parsing oversized or deeply nested HTML responses. Remote attackers can social-engineer users into fetching malicious URLs with pathological HTML structures to exhaust server memory and cause service unavailability.

References:


CVE-2026-28467 — OpenClaw < 2026.2.2 - SSRF via Attachment Media URL Hydration

Field Detail
CVSS 6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CWE CWE-918 (Server-Side Request Forgery (SSRF))
Affected < 2026.2.2
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-wfp2-v9c7-fh79

OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlled sendAttachment or auto-reply mechanisms can trigger SSRF to internal resources and exfiltrate fetched response bytes as outbound attachments.

References:


CVE-2026-28480 — OpenClaw Telegram allowlist authorization accepted mutable usernames

Field Detail
CVSS 6.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CWE CWE-290 (Authentication Bypass by Spoofing)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-mj5r-hh7j-4gxf

OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerability where Telegram allowlist matching accepts mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identity by obtaining recycled usernames to bypass allowlist restrictions and interact with bots as unauthorized senders.

References:


CVE-2026-32063 — OpenClaw Improperly Neutralizes Line Breaks in systemd Unit Generation Enables Local Command Execution (Linux)

Field Detail
CVSS 6.9 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
CWE CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection'))
Affected < 2026.2.21
Vendor/Product openclaw / openclaw
Advisory GHSA-vffc-f7r7-rx2w

OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vulnerability in systemd unit file generation where attacker-controlled environment values are not validated for CR/LF characters, allowing newline injection to break out of Environment= lines and inject arbitrary systemd directives. An attacker who can influence config.env.vars and trigger service install or restart can execute arbitrary commands with the privileges of the OpenClaw gateway service user.

References:


CVE-2026-27008 — OpenClaw hardened the skill download target directory validation

Field Detail
CVSS 6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
CWE CWE-73 (CWE-73: External Control of File Name or Path)
Affected < 2026.2.15
Vendor/Product openclaw / openclaw
Advisory GHSA-h7f7-89mm-pqh6

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a bug in download skill installation allowed targetDir values from skill frontmatter to resolve outside the per-skill tools directory if not strictly validated. In the admin-only skills.install flow, this could write files outside the intended install sandbox. Version 2026.2.15 contains a fix for the issue.

References:


CVE-2026-28486 — OpenClaw 2026.1.16-2 < 2026.2.14 - Path Traversal (Zip Slip) in Archive Extraction via Installation Commands

Field Detail
CVSS 6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
CWE CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-v892-hwpg-jwqp

OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a path traversal vulnerability in archive extraction during installation commands that allows arbitrary file writes outside the intended directory. Attackers can craft malicious archives that, when extracted via skills install, hooks install, plugins install, or signal install commands, write files to arbitrary locations enabling persistence or code execution.

References:


CVE-2026-29612 — OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding

Field Detail
CVSS 6.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWE CWE-770 (Allocation of Resources Without Limits or Throttling)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-w2cg-vxx6-5xjg

OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service.

References:


CVE-2026-26972 — OpenClaw has a Path Traversal in Browser Download Functionality

Field Detail
CVSS 6.7 (MEDIUM) — CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < >= 2026.1.12, < 2026.2.13
Vendor/Product openclaw / openclaw
Advisory GHSA-xwjm-j929-xq7c

OpenClaw is a personal AI assistant. In versions 2026.1.12 through 2026.2.12, OpenClaw browser download helpers accepted an unsanitized output path. When invoked via the browser control gateway routes, this allowed path traversal to write downloads outside the intended OpenClaw temp downloads directory. This issue is not exposed via the AI agent tool schema (no download action). Exploitation requires authenticated CLI access or an authenticated gateway RPC token. Version 2026.2.13 fixes the issue.

References:


CVE-2026-28452 — OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR)

Field Detail
CVSS 6.7 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CWE CWE-770 (Allocation of Resources Without Limits or Throttling)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-h89v-j3x9-8wqj

OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can trigger resource exhaustion by providing maliciously crafted archive files during install or update operations, causing service degradation or system unavailability.

References:


CVE-2026-32061 — OpenClaw < 2026.2.17 - Arbitrary File Read via $include Directive Path Traversal

Field Detail
CVSS 6.7 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.17
Vendor/Product openclaw / openclaw
Advisory GHSA-56pc-6hvp-4gv4

OpenClaw versions prior to 2026.2.17 contain a path traversal vulnerability in the $include directive resolution that allows reading arbitrary local files outside the config directory boundary. Attackers with config modification capabilities can exploit this by specifying absolute paths, traversal sequences, or symlinks to access sensitive files readable by the OpenClaw process user, including API keys and credentials.

References:


CVE-2026-25475 — OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction

Field Detail
CVSS 6.5 (MEDIUM) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE CWE-200 (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor), CWE-22 (CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.1.30
Vendor/Product openclaw / openclaw
Advisory GHSA-r8g4-86fx-92mq

OpenClaw is a personal AI assistant. Prior to version 2026.1.30, the isValidMedia() function in src/media/parse.ts allows arbitrary file paths including absolute paths, home directory paths, and directory traversal sequences. An agent can read any file on the system by outputting MEDIA:/path/to/file, exfiltrating sensitive data to the user/channel. This issue has been patched in version 2026.1.30.


CVE-2026-26328 — OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities

Field Detail
CVSS 6.5 (MEDIUM) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE CWE-284 (CWE-284: Improper Access Control), CWE-863 (CWE-863: Incorrect Authorization)
Affected <= 2026.1.24-3
Vendor/Product openclaw / clawdbot
Advisory GHSA-g34w-4xqq-h79m

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, under iMessage groupPolicy=allowlist, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts. Version 2026.2.14 fixes the issue.

Naming note: Uses old name openclaw/clawdbot as vendor/product. References:


CVE-2026-28451 — OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching

Field Detail
CVSS 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CWE CWE-918 (Server-Side Request Forgery (SSRF))
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-x22m-j5qq-j49m

OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image processing. Attackers can influence tool calls through direct manipulation or prompt injection to trigger requests to internal services and re-upload responses as Feishu media.

References:


CVE-2026-28448 — OpenClaw 2026.1.29 < 2026.2.1 - Authorization Bypass in Twitch Plugin allowFrom Access Control

Field Detail
CVSS 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
CWE CWE-285 (Improper Authorization)
Affected < 2026.2.1
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-33rq-m5x2-fvgf

OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a vulnerability in the Twitch plugin (must be installed and enabled) in which it fails to enforce the allowFrom allowlist when allowedRoles is unset or empty, allowing unauthorized Twitch users to trigger agent dispatch. Remote attackers can mention the bot in Twitch chat to bypass access control and invoke the agent pipeline, potentially causing unintended actions or resource exhaustion.

References:


CVE-2026-28395 — OpenClaw 2026.1.14-1 < 2026.2.12 - Unintended Public Binding of Chrome Extension Relay via Wildcard cdpUrl

Field Detail
CVSS 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
CWE CWE-1327 (Binding to an Unrestricted IP Address)
Affected < 2026.2.12
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-qw99-grcx-4pvm

OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper network binding vulnerability in the Chrome extension (must be installed and enabled) relay server that treats wildcard hosts as loopback addresses, allowing the relay HTTP/WS server to bind to all interfaces when a wildcard cdpUrl is configured. Remote attackers can access relay HTTP endpoints off-host to leak service presence and port information, or conduct denial-of-service and brute-force attacks against the relay token header.

References:


CVE-2026-28471 — OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin

Field Detail
CVSS 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-287 (Improper Authentication)
Affected < 2026.2.2
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-rmxw-jxxx-4cpc

OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.

References:


CVE-2026-28475 — OpenClaw < 2026.2.13 - Timing Attack via Hook Token Comparison

Field Detail
CVSS 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CWE CWE-208 (Observable Timing Discrepancy)
Affected < 2026.2.13
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-47q7-97xp-m272

OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually recover the authentication token.

References:


CVE-2026-28476 — OpenClaw < 2026.2.14 - Server-Side Request Forgery in Tlon Extension Authentication

Field Detail
CVSS 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CWE CWE-918 (Server-Side Request Forgery (SSRF))
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-pg2v-8xwh-qhcc

OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the configured Urbit URL can induce the gateway to make HTTP requests to arbitrary hosts including internal addresses.

References:


CVE-2026-29606 — OpenClaw < 2026.2.14 - Webhook Signature Verification Bypass via ngrok Loopback Compatibility

Field Detail
CVSS 6.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
CWE CWE-306 (Missing Authentication for Critical Function)
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-c37p-4qqg-3p76

OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification bypass in the voice-call extension that allows unauthenticated requests when the tunnel.allowNgrokFreeTierLoopbackBypass option is explicitly enabled. An external attacker can send forged requests to the publicly reachable webhook endpoint without a valid X-Twilio-Signature header, resulting in unauthorized webhook event handling and potential request flooding attacks.

References:


CVE-2026-28477 — OpenClaw < 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow

Field Detail
CVSS 5.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
CWE CWE-352 (Cross-Site Request Forgery (CSRF))
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-7rcp-mxpq-72pj

OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.

References:


CVE-2026-28481 — OpenClaw < 2026.2.1 - Bearer Token Leakage via MS Teams Attachment Downloader Suffix Matching

Field Detail
CVSS 5.9 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-201 (Insertion of Sensitive Information Into Sent Data)
Affected < 0
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-7vwx-582j-j332

OpenClaw versions 2026.1.30 and earlier, contain an information disclosure vulnerability, patched in 2026.2.1, in the MS Teams attachment downloader (optional extension must be enabled) that leaks bearer tokens to allowlisted suffix domains. When retrying downloads after receiving 401 or 403 responses, the application sends Authorization bearer tokens to untrusted hosts matching the permissive suffix-based allowlist, enabling token theft.

References:


CVE-2026-27009 — OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection

Field Detail
CVSS 5.8 (MEDIUM) — CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
CWE CWE-79 (CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
Affected < 2026.2.15
Vendor/Product openclaw / openclaw
Advisory GHSA-37gc-85xm-2ww6

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a atored XSS issue in the OpenClaw Control UI when rendering assistant identity (name/avatar) into an inline <script> tag without script-context-safe escaping. A crafted value containing </script> could break out of the script tag and execute attacker-controlled JavaScript in the Control UI origin. Version 2026.2.15 removed inline script injection and serve bootstrap config from a JSON endpoint and added a restrictive Content Security Policy for the Control UI (script-src 'self', no inline scripts).

References:


CVE-2026-28457 — OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter

Field Detail
CVSS 5.6 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
CWE CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
Affected < 2026.2.14
Vendor/Product OpenClaw / OpenClaw
Advisory GHSA-xw4p-pw82-hqr7

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences like ../ or absolute paths in the name field can write files outside the sandbox workspace root directory.

References:


CVE-2026-26326 — OpenClaw skills.status could leak secrets to operator.read clients

Field Detail
CVSS 5.3 (MEDIUM) — CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CWE CWE-200 (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor)
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-8mh7-phf8-xgfm

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, skills.status could disclose secrets to operator.read clients by returning raw resolved config values in configChecks for skill requires.config paths. Version 2026.2.14 stops including raw resolved config values in requirement checks (return only { path, satisfied }) and narrows the Discord skill requirement to the token key. In addition to upgrading, users should rotate any Discord tokens that may have been exposed to read-scoped clients.

References:


CVE-2026-27007 — OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation

Field Detail
CVSS 4.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CWE CWE-1254 (CWE-1254: Incorrect Comparison Logic Granularity)
Affected < 2026.2.15
Vendor/Product openclaw / openclaw
Advisory GHSA-xxvh-5hwj-42pp

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, normalizeForHash in src/agents/sandbox/config-hash.ts recursively sorted arrays that contained only primitive values. This made order-sensitive sandbox configuration arrays hash to the same value even when order changed. In OpenClaw sandbox flows, this hash is used to decide whether existing sandbox containers should be recreated. As a result, order-only config changes (for example Docker dns and binds array order) could be treated as unchanged and stale containers could be reused. This is a configuration integrity issue affecting sandbox recreation behavior. Starting in version 2026.2.15, array ordering is preserved during hash normalization; only object key ordering remains normalized for deterministic hashing.

References:


CVE-2026-27576 — OpenClaw: ACP prompt-size checks missing in local stdio bridge could reduce responsiveness with very large inputs

Field Detail
CVSS 4.8 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CWE CWE-400 (CWE-400: Uncontrolled Resource Consumption)
Affected < 2026.2.19
Vendor/Product openclaw / openclaw
Advisory GHSA-cxpw-2g23-2vgw

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the ACP bridge accepts very large prompt text blocks and can assemble oversized prompt payloads before forwarding them to chat.send. Because ACP runs over local stdio, this mainly affects local ACP clients (for example IDE integrations) that send unusually large inputs. This issue has been fixed in version 2026.2.19.

References:


CVE-2026-27485 — OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inline script injection

Field Detail
CVSS 4.6 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CWE CWE-61 (CWE-61: UNIX Symbolic Link (Symlink) Following)
Affected < 2026.2.19
Vendor/Product openclaw / openclaw
Advisory GHSA-r6h2-5gqq-v5v6

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, skills/skill-creator/scripts/package_skill.py (a local helper script used when authors package skills) previously followed symlinks while building .skill archives. If an author runs this script on a crafted local skill directory containing symlinks to files outside the skill root, the resulting archive can include unintended file contents. If exploited, this vulnerability can lead to potential unintentional disclosure of local files from the packaging machine into a generated .skill artifact, but requires local execution of the packaging script on attacker-controlled skill contents. This issue has been fixed in version 2026.2.18.

References:


CVE-2026-27486 — OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup

Field Detail
CVSS 4.3 (MEDIUM) — CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H
CWE CWE-283 (CWE-283: Unverified Ownership)
Affected < 2026.2.14
Vendor/Product openclaw / openclaw
Advisory GHSA-jfv4-h8mc-jcp8

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below of the OpenClaw CLI, the process cleanup uses system-wide process enumeration and pattern matching to terminate processes without verifying if they are owned by the current OpenClaw process. On shared hosts, unrelated processes can be terminated if they match the pattern. The CLI runner cleanup helpers can kill processes matched by command-line patterns without validating process ownership. This issue has been fixed in version 2026.2.14.

References:


CVE-2026-24764 — OpenClaw has Remote Code Execution via System Prompt Injection in Slack Channel Descriptions

Field Detail
CVSS 3.7 (LOW) — CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
CWE CWE-74 (CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')), CWE-94 (CWE-94: Improper Control of Generation of Code ('Code Injection'))
Affected < 2026.2.3
Vendor/Product clawdbot / clawdbot
Advisory GHSA-782p-5fr5-7fj8

OpenClaw (formerly Clawdbot) is a personal AI assistant users run on their own devices. In versions 2026.2.2 and below, when the Slack integration is enabled, channel metadata (topic/description) can be incorporated into the model's system prompt. Prompt injection is a documented risk for LLM-driven systems. This issue increases the injection surface by allowing untrusted Slack channel metadata to be treated as higher-trust system input. This issue has been fixed in version 2026.2.3.

Naming note: Uses old name clawdbot/clawdbot as vendor/product. References:


CVE-2026-27484 — OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows

Field Detail
CVSS 2.3 (LOW) — CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CWE CWE-862 (CWE-862: Missing Authorization)
Affected < 2026.2.18
Vendor/Product openclaw / openclaw
Advisory GHSA-wh94-p5m6-mr7j

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action handling (timeout, kick, ban) uses sender identity from request parameters in tool-driven flows, instead of trusted runtime sender context. In setups where Discord moderation actions are enabled and the bot has the necessary guild permissions, a non-admin user can request moderation actions by spoofing sender identity fields. This issue has been fixed in version 2026.2.18.

References:


CVE-2026-30741 — A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6

Field Detail
CVSS None () — ``
CWE
Affected < n/a
Vendor/Product n/a / n/a
Advisory

A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6 allows attackers to execute arbitrary code via a Request-Side prompt injection attack.

References:



⏳ CVE Publication Pipeline

Of 14 GHSAs with CVE IDs, 14 are fully published and 0 remain RESERVED.

graph LR
    A["1️⃣ GitHub Reserves<br/>CVE ID<br/><b>RESERVED</b>"] --> B["2️⃣ GHSA Goes Public<br/>with CVE ID Shown"]
    B --> C["3️⃣ CNA Submits<br/>CVE Record via<br/>CVE Services<br/><b>PUBLISHED</b>"]
    C --> D["4️⃣ cvelistV5 Bot<br/>Commits JSON File"]

    style A fill:#fee,stroke:#c33,color:#333
    style B fill:#fff3cd,stroke:#856404,color:#333
    style C fill:#d4edda,stroke:#155724,color:#333
    style D fill:#cce5ff,stroke:#004085,color:#333
CVE ID State cvelistV5 GHSA Published CNA
CVE-2026-24763 PUBLISHED 2026-02-02 GitHub_M
CVE-2026-25157 PUBLISHED 2026-02-02 GitHub_M
CVE-2026-25253 PUBLISHED 2026-02-02 mitre
CVE-2026-26317 PUBLISHED 2026-02-18 GitHub_M
CVE-2026-26328 PUBLISHED 2026-02-18 GitHub_M
CVE-2026-28452 PUBLISHED 2026-02-18 VulnCheck
CVE-2026-28458 PUBLISHED 2026-02-17 VulnCheck
CVE-2026-28469 PUBLISHED 2026-02-18 VulnCheck
CVE-2026-28478 PUBLISHED 2026-02-18 VulnCheck
CVE-2026-28480 PUBLISHED 2026-02-18 VulnCheck
CVE-2026-29612 PUBLISHED 2026-02-18 VulnCheck
CVE-2026-32059 PUBLISHED 2026-03-03 VulnCheck
CVE-2026-32061 PUBLISHED 2026-03-03 VulnCheck
CVE-2026-32063 PUBLISHED 2026-03-03 VulnCheck

🔑 Key Insights

Insight Detail
Dominant Weakness 52% of categorized issues relate to Allowlist Bypass (67/130)
V5 Sync Rate 14/14 CVE IDs (100%) have full cvelistV5 records
Advisory Velocity 158 security advisories across 2026-02-02 → 2026-03-09
Top Severity 0 Critical + 51 High = 51 high-impact issues (32%)

Vulnerability Categories

Category Count Examples
OS Command Injection (CWE-78) 12 PATH injection, SSH command injection, Docker exec, keychain writes
Path Traversal (CWE-22) 8 MEDIA: paths, plugin install, browser downloads, Zip Slip, transcript paths
SSRF 5 Image tool fetch, Feishu extension, attachment/media URLs, IPv6 bypass
Auth Bypass / Missing Auth 11 WebSocket config.apply, webhook verification, browser relay, sandbox bridge
Allowlist Bypass 67 Telegram usernames, Matrix displayName, Slack DM, Twitch, voice-call
Injection (XSS/CSRF/Prompt) 21 XSS in Control UI, prompt injection via Slack/CWD/logs, CSRF
Denial of Service 6 Unbounded media fetch, webhook body buffering, archive expansion

📋 All Security Advisories (158)

Critical & High Severity

GHSA CVE Severity Title Published
GHSA-6mgf-v5j7-45cr High OpenClaw: fetch-guard forwards custom authorization headers across cross-origin redirects 2026-03-09
GHSA-rchv-x836-w7xp High OpenClaw's dashboard leaked gateway auth material via browser URL/query and localStorage 2026-03-09
GHSA-3jx4-q2m7-r496 High OpenClaw: Hardlink alias checks could bypass workspace-only file boundaries in specific configurations 2026-03-04
GHSA-vvjh-f6p9-5vcf High OpenClaw Canvas Authentication Bypass Vulnerability 2026-03-04
GHSA-x2ff-j5c2-ggpr High OpenClaw: Slack interactive callbacks could skip configured sender checks in some shared-workspace flows 2026-03-04
GHSA-vffc-f7r7-rx2w CVE-2026-32063 High OpenClaw Improperly Neutralizes Line Breaks in systemd Unit Generation Enables Local Command Execution (Linux) 2026-03-03
GHSA-3c6h-g97w-fg78 CVE-2026-32059 High OpenClaw's tools.exec.safeBins sort long-option abbreviation bypass can skip exec approval in allowlist mode 2026-03-03
GHSA-2ch6-x3g4-7759 High OpenClaw's commands.allowFrom sender authorization accepted conversation identifiers via ctx.From 2026-03-03
GHSA-jj82-76v6-933r High OpenClaw's exec allowlist wrapper analysis did not unwrap env/shell dispatch chains 2026-03-03
GHSA-m8v2-6wwh-r4gc High OpenClaw's sandbox bind validation could bypass allowed-root and blocked-path checks via symlink-parent missing-leaf paths 2026-03-03
GHSA-jxrq-8fm4-9p58 High OpenClaw: Zip extraction symlink traversal could write outside destination 2026-03-03
GHSA-659f-22xc-98f2 High OpenClaw hook transform path containment missed symlink-resolved escapes 2026-03-03
GHSA-4gc7-qcvf-38wg High In OpenClaw, manually adding sort to tools.exec.safeBins could bypass allowlist approval via --compress-program 2026-03-03
GHSA-w7j5-j98m-w679 High OpenClaw has multiple E2E/test Dockerfiles that run all processes as root 2026-03-03
GHSA-7ff8-xjh3-mgh6 High OpenClaw's non-default autoAllowSkills setting could bypass on-miss exec prompt 2026-03-03
GHSA-xgf2-vxv2-rrmg High OpenClaw's shell startup env injection bypasses system.run allowlist intent (RCE class) 2026-03-03
GHSA-w9cg-v44m-4qv8 High OpenClaw affected by BASH_ENV / ENV startup-file injection into spawned shell commands 2026-03-03
GHSA-xmv6-r34m-62p4 High OpenClaw: Sandbox media fallback tmp symlink alias bypass allows host file reads outside sandboxRoot 2026-03-03
GHSA-g75x-8qqm-2vxp High OpenClaw's tools.exec.safeBins PATH-hijack allowed trojan binaries to bypass allowlist checks 2026-03-03
GHSA-pj5x-38rw-6fph High OpenClaw has a Command Injection via unescaped environment assignments in Windows Scheduled Task script generation 2026-03-03
GHSA-mqr9-vqhq-3jxw High OpenClaw Windows Scheduled Task script generation allowed local command injection via unsafe cmd argument handling 2026-03-03
GHSA-p4wh-cr8m-gm6c High OpenClaw: shell-env trusted-prefix fallback allowed attacker-controlled binary execution via $SHELL 2026-03-03
GHSA-5gj7-jf77-q2q2 High OpenClaw: safeBins static default trusted dirs allow writable-dir binary hijack (jq) 2026-03-03
GHSA-474h-prjg-mmw3 High OpenClaw: Sandboxed sessions_spawn(runtime="acp") bypassed sandbox inheritance and allowed host ACP initialization 2026-03-03
GHSA-r54r-wmmq-mh84 High OpenClaw: ZIP extraction race could write outside destination via parent symlink rebind 2026-03-03
GHSA-8mvx-p2r9-r375 High OpenClaw's web tools strict URL guard could lose DNS pinning when env proxy is configured 2026-03-03
GHSA-cfvj-7rx7-fc7c High OpenClaw: stageSandboxMedia destination symlink traversal can overwrite files outside sandbox workspace 2026-03-03
GHSA-x9cf-3w63-rpq9 High OpenClaw vulnerable to sensitive file disclosure via stageSandboxMedia 2026-03-03
GHSA-8fmp-37rc-p5g7 High OpenClaw's config env vars allowed startup env injection into service runtime 2026-03-03
GHSA-6rcp-vxwf-3mfp High OpenClaw's system.run shell-wrapper positional argv carriers could execute hidden commands under misleading approval text 2026-03-03
GHSA-mwcg-wfq3-4gjc High OpenClaw's system.run approval TOCTOU via mutable symlink cwd target on node host 2026-03-03
GHSA-rq6g-px6m-c248 CVE-2026-28469 High OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting 2026-02-18
GHSA-3fqr-4cg8-h96q CVE-2026-26317 High OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints 2026-02-18
GHSA-q447-rj3r-2cgh CVE-2026-28478 High OpenClaw affected by denial of service via unbounded webhook request body buffering 2026-02-18
GHSA-mr32-vwc2-5j6h CVE-2026-28458 High OpenClaw's Browser Relay /cdp websocket is missing auth which could allow cross-tab cookie access 2026-02-17
GHSA-q284-4pvr-m585 CVE-2026-25157 High OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand 2026-02-02
GHSA-g8p2-7wf7-98mq CVE-2026-25253 High OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl 2026-02-02
GHSA-mc68-q9jw-2h3v CVE-2026-24763 High OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable 2026-02-02
GHSA-r2c6-8jc8-g32w High Duplicate Advisory: 1-Click RCE via Authentication Token Exfiltration From gatewayUrl 2026-02-02

Medium Severity

GHSA CVE Severity Title Published
GHSA-9q36-67vc-rrwg Medium OpenClaw: Sandboxed /acp spawn requests could initialize host ACP sessions 2026-03-09
GHSA-9q2p-vc84-2rwm Medium OpenClaw: system.run allow-always persistence included shell-commented payload tails 2026-03-09
GHSA-hfpr-jhpq-x4rm Medium OpenClaw: operator.write chat.send could reach admin-only config writes 2026-03-09
GHSA-r6qf-8968-wj9q Medium OpenClaw: system.run wrapper-depth boundary could skip shell approval gating 2026-03-09
GHSA-pjvx-rx66-r3fg Medium OpenClaw: Cross-account sender authorization expansion in /allowlist ... --store account scoping 2026-03-09
GHSA-3h2q-j2v4-6w5r Medium OpenClaw's system.run allowlist approval parsing missed PowerShell encoded-command wrappers 2026-03-09
GHSA-j425-whc4-4jgc Medium OpenClaw's system.run env override filtering allowed dangerous helper-command pivots 2026-03-09
GHSA-6rmx-gvvg-vh6j Medium OpenClaw's hooks count non-POST requests toward auth lockout 2026-03-09
GHSA-jwf4-8wf4-jf2m Medium OpenClaw: BlueBubbles (optional plugin) pairing/allowlist mismatch when allowFrom is empty 2026-03-04
GHSA-jjgj-cpp9-cvpv Medium OpenClaw Vulnerable to Local File Exfiltration via MCP Tool Result MEDIA: Directive Injection 2026-03-04
GHSA-q6qf-4p5j-r25g Medium OpenClaw's image tool bypasses tools.fs.workspaceOnly on sandbox mount paths and exfiltrates out-of-workspace images 2026-03-04
GHSA-4rqq-w8v4-7p47 Medium OpenClaw has incomplete IPv4 special-use SSRF blocking in web fetch guard 2026-03-04
GHSA-9mph-4f7v-fmvh Medium OpenClaw has agent avatar symlink traversal in gateway session metadata 2026-03-04
GHSA-f6h3-846h-2r8w Medium OpenClaw's elevated allowFrom accepted broader identity signals than specified within sender-scoped authorization 2026-03-04
GHSA-8cp7-rp8r-mg77 Medium OpenClaw has SSRF guard bypass via IPv6 transition over ISATAP 2026-03-04
GHSA-56pc-6hvp-4gv4 CVE-2026-32061 Medium OpenClaw vulnerable to arbitrary file read via $include directive 2026-03-03
GHSA-gq83-8q7q-9hfx Medium OpenClaw's serialize sandbox registry writes to prevent races and delete-rollback corruption 2026-03-03
GHSA-rv2q-f2h5-6xmg Medium OpenClaw's Node role device-identity bypass allows unauthorized node.event injection 2026-03-03
GHSA-fg3m-vhrr-8gj6 Medium OpenClaw has Windows Lobster shell fallback command injection in constrained fallback path 2026-03-03
GHSA-534w-2vm4-89xr Medium OpenClaw's Zalo group sender allowlist bypass permits unauthorized GROUP dispatch 2026-03-03
GHSA-cjv3-m589-v3rx Medium OpenClaw has Canvas route hardening for mixed-trust deployments 2026-03-03
GHSA-wpph-cjgr-7c39 Medium OpenClaw's typed sender-key matching for toolsBySender prevents identity-collision policy bypass 2026-03-03
GHSA-792q-qw95-f446 Medium OpenClaw's Signal reaction-only status events could, in limited cases, be enqueued before access checks 2026-03-03
GHSA-r9q5-c7qc-p26w Medium OpenClaw's Nextcloud Talk webhook replay could trigger duplicate inbound processing 2026-03-03
GHSA-gw85-xp4q-5gp9 Medium OpenClaw's Synology Chat dmPolicy=allowlist failed open on empty allowedUserIds, allowing unauthorized agent dispatch 2026-03-03
GHSA-25pw-4h6w-qwvm Medium OpenClaw has a BlueBubbles group allowlist mismatch via DM pairing-store fallback 2026-03-03
GHSA-796m-2973-wc5q Medium OpenClaw has exec allowlist/safeBins policy-runtime mismatch via env -S wrapper interpretation 2026-03-03
GHSA-jmmg-jqc7-5qf4 Medium OpenClaw's browser-origin WebSocket auth hardening gap could enable loopback password brute-force chains 2026-03-03
GHSA-2rgf-hm63-5qph Medium OpenClaw improperly parses X-Forwarded-For behind trusted proxies allows client IP spoofing in security decisions 2026-03-03
GHSA-27cr-4p5m-74rj Medium OpenClaw has a workspace-only sandbox guard mismatch for @-prefixed absolute paths 2026-03-03
GHSA-r294-2894-92j3 Medium OpenClaw has stored XSS in exported session HTML viewer via markdown/raw-HTML rendering 2026-03-03
GHSA-v3j7-34xh-6g3w Medium OpenClaw Loopback CDP probe can leak Gateway token to local listener 2026-03-03
GHSA-4cqv-h74h-93j4 Medium OpenClaw has a Discord allowFrom slug-collision authorization bypass 2026-03-03
GHSA-3cvx-236h-m9fj Medium OpenClaw has an opt-in insecure Control UI auth over plaintext HTTP could allow privileged access 2026-03-03
GHSA-h97f-6pqj-q452 Medium OpenClaw has a IPv6 multicast SSRF classifier bypass 2026-03-03
GHSA-3x3x-h76w-hp98 Medium OpenClaw exec allowlist safeBins short-option bypass could permit arbitrary file write 2026-03-03
GHSA-pfv7-rr5m-qmv6 Medium OpenClaw has auth inconsistency on local Browser Extension Relay /extension endpoint 2026-03-03
GHSA-j4xf-96qf-rx69 Medium OpenClaw has a Feishu allowFrom authorization bypass via display-name collision 2026-03-03
GHSA-9p38-94jf-hgjj Medium OpenClaw has macOS system.run allowlist bypass via quoted command substitution 2026-03-03
GHSA-5h2c-8v84-qpvr Medium OpenClaw shell-env fallback trusted startup env and could execute attacker-influenced login-shell paths 2026-03-03
GHSA-ff98-w8hj-qrxf Medium OpenClaw plugin runtime command execution is part of trusted plugin boundary 2026-03-03
GHSA-553v-f69r-656j Medium OpenClaw unpaired device identity can bypass operator pairing and self-assign operator scopes with shared auth 2026-03-03
GHSA-45cg-2683-gfmq Medium OpenClaw browser navigation guard allowed non-network URL schemes, enabling authenticated browser-tool users to access file:// local files 2026-03-03
GHSA-h9xm-j4qg-fvpg Medium OpenClaw: Experimental apply_patch may bypass workspace-only checks in opt-in sandbox mounts (off by default) 2026-03-03
GHSA-j26j-7qc4-3mrf Medium OpenClaw: MS Teams fileConsent/invoke missing conversation binding allowed cross-conversation pending-upload consumption 2026-03-03
GHSA-2hm8-rqrm-xfjq Medium OpenClaw's owner-only gateway tool access checks were incomplete in specific authenticated DM flows 2026-03-03
GHSA-2mc2-g238-722j Medium OpenClaw affected by iMessage remote attachment SCP hardening (strict host-key checks and remoteHost validation) 2026-03-03
GHSA-77hf-7fqf-f227 Medium OpenClaw skills-install-download: tar.bz2 extraction bypassed archive safety parity checks (local DoS) 2026-03-03
GHSA-wpg9-4g4v-f9rc Medium OpenClaw: Discord voice transcript owner-flag omission could expose owner-only tools in mixed-trust channels 2026-03-03
GHSA-v865-p3gq-hw6m Medium OpenClaw has encoded-path auth bypass in plugin /api/channels route classification 2026-03-03
GHSA-354r-7mfh-7rh2 Medium OpenClaw: Discord DM reaction ingress missed dmPolicy/allowFrom checks in restricted setups 2026-03-03
GHSA-3pxq-f3cp-jmxp Medium OpenClaw: Unified root-bound write hardening for browser output and related path-boundary flows 2026-03-03
GHSA-h3rm-6x7g-882f Medium OpenClaw's Node system.run approval hardening wrapper semantic drift can execute unintended local scripts 2026-03-03
GHSA-2858-xg23-26fp Medium OpenClaw: Node camera URL payload host-binding bypass allowed gateway fetch pivots 2026-03-03
GHSA-x4vp-4235-65hg Medium OpenClaw has pre-auth webhook body parsing that can enable unauthenticated slow-request DoS 2026-03-03
GHSA-9868-vxmx-w862 Medium OpenClaw's system.run allowlist bypass via shell line-continuation command substitution 2026-03-03
GHSA-f8mp-vj46-cq8v Medium OpenClaw's shell env fallback trusts unvalidated SHELL path from host environment 2026-03-03
GHSA-qhrr-grqp-6x2g Medium OpenClaw's tools.exec.safeBins trusted PATH directories allowed binary shadowing in allowlist mode 2026-03-03
GHSA-rm2p-j3r7-4x4j Medium OpenClaw's Slack reaction/pin sender-policy consistency issue in non-message ingress 2026-03-03
GHSA-25gx-x37c-7pph Medium OpenClaw's andbox browser noVNC observer lacked VNC authentication 2026-03-03
GHSA-jv6r-27ww-4gw4 Medium OpenClaw DM pairing-store identities could satisfy group allowlist authorization 2026-03-03
GHSA-ccg8-46r6-9qgj Medium OpenClaw's dispatch-wrapper depth-cap mismatch can bypass shell-wrapper approval gating in system.run allowlist mode 2026-03-03
GHSA-mj5r-hh7j-4gxf CVE-2026-28480 Medium OpenClaw Telegram allowlist authorization accepted mutable usernames 2026-02-18
GHSA-h89v-j3x9-8wqj CVE-2026-28452 Medium OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR) 2026-02-18
GHSA-w2cg-vxx6-5xjg CVE-2026-29612 Medium OpenClaw: denial of service through large base64 media files allocating large buffers before limit checks 2026-02-18
GHSA-g34w-4xqq-h79m CVE-2026-26328 Medium OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities 2026-02-18

Low Severity

GHSA CVE Severity Title Published
GHSA-vjp8-wprm-2jw9 Low OpenClaw has cross-account DM pairing authorization bypass via unscoped pairing store access 2026-03-04
GHSA-8mf7-vv8w-hjr2 Low OpenClaw's tools.exec.safeBins generic fallback allowed interpreter-style inline payload execution in allowlist mode 2026-03-03
GHSA-v6x2-2qvm-6gv8 Low OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback 2026-03-03
GHSA-gcj7-r3hg-m7w6 Low OpenClaw's voice-call Twilio replay dedupe now bound to authenticated webhook identity 2026-03-03
GHSA-7qf6-h84j-8fq4 Low OpenClaw: Microsoft Teams media fetch paths bypass shared SSRF guard model 2026-03-03
GHSA-62f6-mrcj-v8h5 Low OpenClaw's runtime /debug override path accepted prototype-reserved keys 2026-03-03
GHSA-vvgp-4c28-m3jm Low OpenClaw has a Trusted-proxy Control UI pairing bypass which allows unpaired node sessions 2026-03-03
GHSA-chm2-m3w2-wcxm Low OpenClaw Google Chat spoofing access with allowlist authorized mutable email principal despite sender-ID mismatch 2026-02-17

Repo-Only Advisories (~45 more)

These advisories are listed on the repo security page but not yet indexed in the GitHub Advisory Database. See the full advisory list for details.

Show 45 repo-only advisories
GHSA Severity Title Published
GHSA-6f6j-wx9w-ff4j High ACPX Windows wrapper shell fallback allowed cwd injection in specific paths 2026-03-02
GHSA-9f72-qcpw-2hxc High Native prompt image auto-load did not honor tools.fs.workspaceOnly in sandboxed runs 2026-02-25
GHSA-gp3q-wpq4-5c5h High LINE group allowlist scope mismatch with DM pairing-store entries 2026-02-26
GHSA-hwpq-rrpf-pgcq High system.run approval identity mismatch could execute a different binary than displayed 2026-02-26
GHSA-jr6x-2q95-fh2g High Authorization mismatch allowed write-scope agent runs to reach owner-only tools 2026-03-02
GHSA-mfg5-7q5g-f37j High voice-call media stream validated streams after upgrade, which could allow pre-start unauthenticated sockets to increase resource pressure 2026-02-23
GHSA-mgrq-9f93-wpp5 High workspace path guard bypass on non-existent out-of-root symlink leaf 2026-02-26
GHSA-mwxv-35wr-4vvj High Gateway plugin auth bypass via encoded dot-segment traversal in protected /api/channels paths 2026-02-26
GHSA-p7gr-f84w-hqg5 High Sandboxed sessions_spawn now enforces sandbox inheritance for cross-agent spawns 2026-03-02
GHSA-q399-23r3-hfx4 High system.run approvals did not bind PATH-token executable identity, enabling post-approval executable rebind 2026-03-02
GHSA-qcc4-p59m-p54m High Sandbox dangling-symlink alias handling could bypass workspace-only write boundary 2026-02-26
GHSA-r65x-2hqr-j5hf High Node reconnect metadata spoofing could bypass platform-based node command policy 2026-02-26
GHSA-2ww6-868g-2c56 Medium HTML injection via unvalidated image MIME type in data-URL interpolation 2026-02-24
GHSA-33hm-cq8r-wc49 Medium Temporary path handling could write outside OpenClaw temp boundary 2026-02-25
GHSA-36h3-7c54-j27r Medium Browser trace/download path symlink escape in temp output handling 2026-02-26
GHSA-392f-ggf5-fp3c Medium Unicode canonicalization drift in node metadata policy classification could broaden node allowlists 2026-03-02
GHSA-48wf-g7cp-gr3m Medium allowlist exec-guard bypass via env -S 2026-02-24
GHSA-6x2m-hqfw-hvpj Medium Node exec approvals could be replayed across nodes 2026-02-24
GHSA-7jx5-9fjg-hp4m Medium ACP permission auto-approval bypass via untrusted tool metadata 2026-02-24
GHSA-7xmq-g46g-f8pv Medium Sandbox media TOCTOU could read files outside sandbox root 2026-03-02
GHSA-8g75-q649-6pv6 Medium system.run approvals did not bind mutable script operands across approval and execution 2026-03-10
GHSA-8j2w-6fmm-m587 Medium /api/channels gateway-auth boundary bypass via path canonicalization mismatch 2026-02-26
GHSA-8j9w-9pm5-pv8m Medium DUPLICATE of GHSA-3c6h-g97w-fg78: safeBins denied flags can be bypassed via GNU long-option abbreviations 2026-02-24
GHSA-8m9v-xpgf-g99m Medium Unauthorized sender bypass in stop triggers and /models command authorization 2026-03-02
GHSA-f7ww-2725-qvw2 Medium Node system.run approval bypass via parent-symlink cwd rebind 2026-02-26
GHSA-fgvx-58p6-gjwc Medium Gateway agents.files symlink escape allowed out-of-workspace file read/write 2026-02-26
GHSA-fqcm-97m6-w7rm Medium Message action attachment hydration bypasses local media root checks when sandboxRoot is unset 2026-02-25
GHSA-g7cr-9h7q-4qxq Medium MS Teams sender allowlist bypass when route allowlist is configured and sender allowlist is empty 2026-03-11
GHSA-g99v-8hwm-g76g Medium web_search citation redirect SSRF via private-network-allowing policy 2026-03-02
GHSA-gwqp-86q6-w47g Medium exec allow-always can be bypassed via unrecognized multiplexer shell wrappers (busybox/toybox sh -c) 2026-02-24
GHSA-h656-5vcf-cm23 Medium Telegram: Unauthorized Senders Trigger Media Download and Disk Write Before Access Check 2026-02-25
GHSA-hjvp-qhm6-wrh2 Medium Node system.run approval context-binding weakness in approval-enabled host=node flows 2026-02-26
GHSA-qj22-xqjr-v83v Medium Telegram message_reaction authorization bypass allows unauthorized system-event injection 2026-02-26
GHSA-rx3g-mvc3-qfjf Medium Avatar symlink traversal can expose out-of-workspace local files 2026-02-23
GHSA-v8cg-4474-49v8 Medium Slack system events bypass sender authorization in member and message subtype handlers 2026-02-26
GHSA-vhwf-4x96-vqx2 Medium skills-install-download can be redirected outside the tools root by rebinding the validated base path 2026-03-11
GHSA-vmqr-rc7x-3446 Medium Non-default safeBins sort configuration can bypass intended allowlist approval constraints 2026-02-23
GHSA-vpj2-69hf-rppw Medium Browser control startup could continue unauthenticated after auth bootstrap failure 2026-03-02
GHSA-vqx8-9xxw-f2m7 Medium voice-call Twilio webhook replay could bypass manager dedupe because normalized event IDs were randomized per parse 2026-02-24
GHSA-wr6m-jg37-68xh Medium Unbounded memory growth in Zalo webhook via query-string key churn (unauthenticated DoS) 2026-03-02
GHSA-x82f-27x3-q89c Medium TOCTOU symlink race in writeFileWithinRoot could create or truncate files outside root boundaries 2026-03-02
GHSA-2j9j-gf59-p4p5 Low iOS deep link (openclaw://agent) can trigger gateway agent requests without local confirmation 2026-02-24
GHSA-6g25-pc82-vfwp Low macOS beta onboarding exposed PKCE verifier via OAuth state 2026-02-26
GHSA-wm8r-w8pf-2v6w Low Signal group allowlist authorization bypass via DM pairing-store leakage 2026-02-26
GHSA-ww6v-v748-x7g9 Low sandbox network isolation bypass via docker.network=container: 2026-02-25

Naming Inconsistencies

The OpenClaw project has been renamed multiple times, causing inconsistencies across CVE records:

CVE vendor product packageURL Description Names
CVE-2026-28363 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28466 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28474 OpenClaw nextcloud-talk pkg:npm/openclaw-nextcloud-talk OpenClaw
CVE-2026-28391 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28446 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28472 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28470 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-25253 OpenClaw OpenClaw pkg:npm/clawdbot OpenClaw / clawdbot / Moltbot
CVE-2026-24763 clawdbot clawdbot OpenClaw (formerly Clawdbot)
CVE-2026-28462 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28478 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28479 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-29609 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-32062 openclaw voice-call pkg:npm/openclaw OpenClaw
CVE-2026-32060 openclaw openclaw pkg:npm/openclaw OpenClaw
CVE-2026-32059 openclaw openclaw pkg:npm/openclaw OpenClaw
CVE-2026-26323 openclaw openclaw OpenClaw
CVE-2026-27001 openclaw openclaw OpenClaw
CVE-2026-28456 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28463 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28468 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-25593 openclaw openclaw OpenClaw
CVE-2026-28482 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28393 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28450 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28453 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28392 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28454 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28469 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28465 OpenClaw voice-call pkg:npm/openclaw-voice-call OpenClaw
CVE-2026-28464 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-29611 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-29613 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-25157 openclaw openclaw OpenClaw
CVE-2026-27002 openclaw openclaw OpenClaw
CVE-2026-29610 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-26322 openclaw openclaw OpenClaw
CVE-2026-27487 openclaw openclaw OpenClaw
CVE-2026-26321 openclaw openclaw OpenClaw
CVE-2026-25474 openclaw openclaw OpenClaw
CVE-2026-26319 openclaw openclaw OpenClaw
CVE-2026-26316 openclaw @openclaw/bluebubbles OpenClaw
CVE-2026-26324 openclaw openclaw OpenClaw
CVE-2026-28485 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28458 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-26325 openclaw openclaw OpenClaw
CVE-2026-28473 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-26320 openclaw openclaw OpenClaw
CVE-2026-26317 openclaw clawdbot OpenClaw (formerly Clawdbot)
CVE-2026-26327 openclaw openclaw OpenClaw
CVE-2026-26329 openclaw openclaw OpenClaw
CVE-2026-28459 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28447 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-27004 openclaw openclaw OpenClaw
CVE-2026-27003 openclaw openclaw OpenClaw
CVE-2026-27488 openclaw openclaw OpenClaw
CVE-2026-28394 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28467 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28480 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-32063 openclaw openclaw pkg:npm/openclaw OpenClaw
CVE-2026-27008 openclaw openclaw OpenClaw
CVE-2026-28486 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-29612 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-26972 openclaw openclaw OpenClaw
CVE-2026-28452 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-32061 openclaw openclaw pkg:npm/openclaw OpenClaw
CVE-2026-25475 openclaw openclaw OpenClaw
CVE-2026-26328 openclaw clawdbot OpenClaw (formerly Clawdbot)
CVE-2026-28451 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28448 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28395 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28471 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28475 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28476 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-29606 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28477 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-28481 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-27009 openclaw openclaw OpenClaw
CVE-2026-28457 OpenClaw OpenClaw pkg:npm/openclaw OpenClaw
CVE-2026-26326 openclaw openclaw OpenClaw
CVE-2026-27007 openclaw openclaw OpenClaw
CVE-2026-27576 openclaw openclaw OpenClaw
CVE-2026-27485 openclaw openclaw OpenClaw
CVE-2026-27486 openclaw openclaw OpenClaw
CVE-2026-24764 clawdbot clawdbot OpenClaw (formerly Clawdbot)
CVE-2026-27484 openclaw openclaw OpenClaw
CVE-2026-30741 n/a n/a OpenClaw

Data Sources

Source URL
CVE List v5 CVEProject/cvelistV5
GitHub Advisory DB github.com/advisories
Repo Security Tab openclaw/openclaw/security
CVE Services API https://cveawg.mitre.org/api/cve-id/{CVE-ID}

Auto-generated by update_readme.py · Updated hourly via GitHub Actions
Data: ghsa-advisories.json · cves.json · cve-pipeline-status.json

Maintained by Jerry Gamblin · OpenClawCVEs