Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32038 | 9.8 CRITICAL | OpenClaw - Sandbox Network Isolation Bypass via docker.network=container Parameter |
| CVE-2026-32013 | 8.8 HIGH | OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods |
| CVE-2026-31998 | 8.6 HIGH | OpenClaw 2026.2.22 < 2026.2.24 - Authorization Bypass in Synology Chat Plugin via Empty al |
| CVE-2026-32034 | 8.1 HIGH | OpenClaw < 2026.2.21 - Insecure Control UI Authentication over Plaintext HTTP |
| CVE-2026-32014 | 8.0 HIGH | OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields |
| CVE-2026-32032 | 7.8 HIGH | OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variabl |
| CVE-2026-32016 | 7.8 HIGH | OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS |
| CVE-2026-32015 | 7.8 HIGH | OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Va |
| CVE-2026-32030 | 7.5 HIGH | OpenClaw < 2026.2.19 - Sensitive File Disclosure via stageSandboxMedia Path Traversal |
| CVE-2026-28461 | 7.5 HIGH | OpenClaw < 2026.3.1 - Unbounded Memory Growth in Zalo Webhook via Query String Key Churn |
| CVE-2026-32025 | 7.5 HIGH | OpenClaw < 2026.2.25 - Password Brute-Force via Browser-Origin WebSocket Authentication By |
| CVE-2026-32011 | 7.5 HIGH | OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing |
| CVE-2026-31989 | 7.4 HIGH | OpenClaw < 2026.3.1 - Server-Side Request Forgery via web_search Citation Redirect |
| CVE-2026-32019 | 7.4 HIGH | OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard |
| CVE-2026-27566 | 7.1 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Wrapper Binary Unwrapping in system.run |
| CVE-2026-28460 | 7.1 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Shell Line-Continuation Command Substitution i |
| CVE-2026-31992 | 7.1 HIGH | OpenClaw < 2026.2.23 - Allowlist Exec-Guard Bypass via env -S |
| CVE-2026-32000 | 7.1 HIGH | OpenClaw < 2026.2.19 - Command Injection via Windows Shell Fallback in Lobster Tool Execut |
| CVE-2026-32017 | 7.1 HIGH | OpenClaw < 2026.2.19 - Arbitrary File Write via Short-Option Bypass in exec Allowlist |
| CVE-2026-32023 | 7.1 HIGH | OpenClaw < 2026.2.24 - Approval Gating Bypass via Dispatch-Wrapper Depth-Cap Mismatch in s |
Showing top 20 of 60 CVEs. View all on vendor page → →
No comments yet