Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-28466 | 9.9 CRITICAL | OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass |
| CVE-2026-28474 | 9.8 CRITICAL | OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing |
| CVE-2026-28391 | 9.8 CRITICAL | OpenClaw < 2026.2.2 - Command Injection via cmd.exe Parsing Bypass in Allowlist Enforcemen |
| CVE-2026-28470 | 9.8 CRITICAL | OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double Quotes |
| CVE-2026-28446 | 9.4 CRITICAL | OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Ca |
| CVE-2026-29610 | 8.8 HIGH | OpenClaw < 2026.2.14 - Command Hijacking via Unsafe PATH Handling |
| CVE-2026-28463 | 8.4 HIGH | OpenClaw < 2026.2.14 - Arbitrary File Read via Shell Expansion in Safe Bins Allowlist |
| CVE-2026-28485 | 8.4 HIGH | OpenClaw 2026.1.5 < 2026.2.12 - Missing Authentication in Browser Control HTTP Endpoints |
| CVE-2026-28451 | 8.3 HIGH | OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching |
| CVE-2026-28473 | 8.1 HIGH | OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command |
| CVE-2026-28458 | 8.1 HIGH | OpenClaw 2026.1.20 < 2026.2.1 - Missing Authentication in Browser Relay /cdp WebSocket End |
| CVE-2026-28472 | 8.1 HIGH | OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake |
| CVE-2026-28447 | 8.1 HIGH | OpenClaw 2026.1.29-beta.1 < 2026.2.1 - Path Traversal in Plugin Installation via Package N |
| CVE-2026-28468 | 7.7 HIGH | OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Se |
| CVE-2026-28393 | 7.7 HIGH | OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform |
| CVE-2026-28392 | 7.5 HIGH | OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Mess |
| CVE-2026-28462 | 7.5 HIGH | OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths |
| CVE-2026-28479 | 7.5 HIGH | OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration |
| CVE-2026-29611 | 7.5 HIGH | OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media H |
| CVE-2026-28469 | 7.5 HIGH | OpenClaw < 2026.2.14 - Cross-Account Policy Context Misrouting via Shared Webhook Path Amb |
Showing top 20 of 46 CVEs. View all on vendor page → →
No comments yet