高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-26322 | 7.6 HIGH | OpenClaw Gateway tool allowed unrestricted gatewayUrl override |
| CVE-2026-26316 | 7.5 HIGH | OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust |
| CVE-2026-26319 | 7.5 HIGH | OpenClaw has Missing Webhook Authentication in Telnyx Provider Allowing Unauthenticated Re |
| CVE-2026-25474 | 7.5 HIGH | OpenClaw has a Telegram webhook request forgery (missing `channels.telegram.webhookSecret` |
| CVE-2026-26321 | 7.5 HIGH | OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension |
| CVE-2026-26324 | 7.5 HIGH | OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reach |
| CVE-2026-26325 | 7.2 HIGH | OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals |
| CVE-2026-26317 | 7.1 HIGH | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation e |
| CVE-2026-26972 | 6.7 MEDIUM | OpenClaw has a Path Traversal in Browser Download Functionality |
| CVE-2026-26328 | 6.5 MEDIUM | OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities |
| CVE-2026-27009 | 5.8 MEDIUM | OpenClaw affected by Stored XSS in Control UI via unsanitized assistant name/avatar in inl |
| CVE-2026-26327 | OpenClaw allows unauthenticated discovery TXT records to steer routing and TLS pinning | |
| CVE-2026-26326 | OpenClaw skills.status could leak secrets to operator.read clients | |
| CVE-2026-26329 | OpenClaw has a path traversal in browser upload allows local file read | |
| CVE-2026-26323 | OpenClaw has a command injection in maintainer clawtributors updater | |
| CVE-2026-27001 | OpenClaw: Unsanitized CWD path injection into LLM prompts | |
| CVE-2026-27002 | OpenClaw: Docker container escape via unvalidated bind mount config injection | |
| CVE-2026-27003 | OpenClaw: Telegram bot token exposure via logs | |
| CVE-2026-27007 | OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container rec | |
| CVE-2026-27008 | OpenClaw hardened the skill download target directory validation |
Showing 20 of 22 CVEs. View all on vendor page →
まだコメントはありません