Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-26322 | 7.6 HIGH | OpenClaw Gateway tool allowed unrestricted gatewayUrl override |
| CVE-2026-26316 | 7.5 HIGH | OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust |
| CVE-2026-26319 | 7.5 HIGH | OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Re |
| CVE-2026-25474 | 7.5 HIGH | OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret` |
| CVE-2026-26321 | 7.5 HIGH | OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension |
| CVE-2026-26324 | 7.5 HIGH | OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reach |
| CVE-2026-26325 | 7.2 HIGH | OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals |
| CVE-2026-26317 | 7.1 HIGH | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation e |
| CVE-2026-26972 | 6.7 MEDIUM | OpenClaw has a Path Traversal in Browser Download Functionality |
| CVE-2026-26328 | 6.5 MEDIUM | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities |
| CVE-2026-27009 | 5.8 MEDIUM | OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inl |
| CVE-2026-26327 | OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning | |
| CVE-2026-26326 | OpenClaw skills.status could leak secrets to operator.read clients | |
| CVE-2026-26323 | OpenClaw has a command injection in maintainer clawtributors updater | |
| CVE-2026-27001 | OpenClaw: Unsanitized CWD path injection into LLM prompts | |
| CVE-2026-27002 | OpenClaw: Docker container escape via unvalidated bind mount config injection | |
| CVE-2026-27003 | OpenClaw: Telegram bot token exposure via logs | |
| CVE-2026-27004 | OpenClaw session tool visibility hardening and Telegram webhook secret fallback | |
| CVE-2026-27007 | OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container rec | |
| CVE-2026-27008 | OpenClaw hardened the skill download target directory validation |
Showing top 20 of 22 CVEs. View all on vendor page → →
No comments yet