Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-28466 | 9.9 CRITICAL | OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass |
| CVE-2026-28391 | 9.8 CRITICAL | OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcemen |
| CVE-2026-28474 | 9.8 CRITICAL | OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing |
| CVE-2026-28470 | 9.8 CRITICAL | OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double Quotes |
| CVE-2026-28446 | 9.4 CRITICAL | OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Ca |
| CVE-2026-29610 | 8.8 HIGH | OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling |
| CVE-2026-28485 | 8.4 HIGH | OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints |
| CVE-2026-28463 | 8.4 HIGH | OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist |
| CVE-2026-28476 | 8.3 HIGH | OpenClaw < 2026.2.14 - Server-Side Request Forgery in Tlon Extension Authentication |
| CVE-2026-28451 | 8.3 HIGH | OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching |
| CVE-2026-28472 | 8.1 HIGH | OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake |
| CVE-2026-28458 | 8.1 HIGH | OpenClaw 2026.1.20 < 2026.2.1 - Missing Authentication in Browser Relay /cdp WebSocket End |
| CVE-2026-28473 | 8.1 HIGH | OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command |
| CVE-2026-28447 | 8.1 HIGH | OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package N |
| CVE-2026-28468 | 7.7 HIGH | OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Se |
| CVE-2026-28393 | 7.7 HIGH | OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform |
| CVE-2026-28453 | 7.5 HIGH | OpenClaw < 2026.2.14 - Zip Slip Path Traversal in TAR Archive Extraction |
| CVE-2026-28454 | 7.5 HIGH | OpenClaw < 2026.2.2 - Authorization Bypass via Unauthenticated Telegram Webhook |
| CVE-2026-28479 | 7.5 HIGH | OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration |
| CVE-2026-29611 | 7.5 HIGH | OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media H |
Showing top 20 of 46 CVEs. View all on vendor page → →
No comments yet