Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32038 | 9.8 CRITICAL | OpenClaw - Sandbox Network Isolation Bypass via docker.network=container Parameter |
| CVE-2026-32013 | 8.8 HIGH | OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods |
| CVE-2026-31998 | 8.6 HIGH | OpenClaw 2026.2.22 < 2026.2.24 - Authorization Bypass in Synology Chat Plugin via Empty al |
| CVE-2026-32034 | 8.1 HIGH | OpenClaw < 2026.2.21 - Insecure Control UI Authentication over Plaintext HTTP |
| CVE-2026-32014 | 8.0 HIGH | OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields |
| CVE-2026-32016 | 7.8 HIGH | OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS |
| CVE-2026-32015 | 7.8 HIGH | OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Va |
| CVE-2026-32032 | 7.8 HIGH | OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variabl |
| CVE-2026-32025 | 7.5 HIGH | OpenClaw < 2026.2.25 - Password Brute-Force via Browser-Origin WebSocket Authentication By |
| CVE-2026-28461 | 7.5 HIGH | OpenClaw < 2026.3.1 - Unbounded Memory Growth in Zalo Webhook via Query String Key Churn |
| CVE-2026-32011 | 7.5 HIGH | OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing |
| CVE-2026-32030 | 7.5 HIGH | OpenClaw < 2026.2.19 - Sensitive File Disclosure via stageSandboxMedia Path Traversal |
| CVE-2026-32019 | 7.4 HIGH | OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard |
| CVE-2026-32023 | 7.1 HIGH | OpenClaw < 2026.2.24 - Approval Gating Bypass via Dispatch-Wrapper Depth-Cap Mismatch in s |
| CVE-2026-32017 | 7.1 HIGH | OpenClaw < 2026.2.19 - Arbitrary File Write via Short-Option Bypass in exec Allowlist |
| CVE-2026-27566 | 7.1 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Wrapper Binary Unwrapping in system.run |
| CVE-2026-32000 | 7.1 HIGH | OpenClaw < 2026.2.19 - Command Injection via Windows Shell Fallback in Lobster Tool Execut |
| CVE-2026-31994 | 7.1 HIGH | OpenClaw < 2026.2.19 - Local Command Injection via Unsafe cmd Argument Handling in Windows |
| CVE-2026-28460 | 7.1 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Shell Line-Continuation Command Substitution i |
| CVE-2026-31992 | 7.1 HIGH | OpenClaw < 2026.2.23 - Allowlist Exec-Guard Bypass via env -S |
Showing top 20 of 60 CVEs. View all on vendor page → →
No comments yet