Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32038 | 9.8 CRITICAL | OpenClaw - Sandbox Network Isolation Bypass via docker.network=container Parameter |
| CVE-2026-32013 | 8.8 HIGH | OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods |
| CVE-2026-31998 | 8.6 HIGH | OpenClaw 2026.2.22 < 2026.2.24 - Authorization Bypass in Synology Chat Plugin via Empty al |
| CVE-2026-32034 | 8.1 HIGH | OpenClaw < 2026.2.21 - Insecure Control UI Authentication over Plaintext HTTP |
| CVE-2026-32014 | 8.0 HIGH | OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields |
| CVE-2026-32015 | 7.8 HIGH | OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Va |
| CVE-2026-32016 | 7.8 HIGH | OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS |
| CVE-2026-32032 | 7.8 HIGH | OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variabl |
| CVE-2026-32011 | 7.5 HIGH | OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing |
| CVE-2026-32025 | 7.5 HIGH | OpenClaw < 2026.2.25 - Password Brute-Force via Browser-Origin WebSocket Authentication By |
| CVE-2026-32030 | 7.5 HIGH | OpenClaw < 2026.2.19 - Sensitive File Disclosure via stageSandboxMedia Path Traversal |
| CVE-2026-28461 | 7.5 HIGH | OpenClaw < 2026.3.1 - Unbounded Memory Growth in Zalo Webhook via Query String Key Churn |
| CVE-2026-31989 | 7.4 HIGH | OpenClaw < 2026.3.1 - Server-Side Request Forgery via web_search Citation Redirect |
| CVE-2026-32019 | 7.4 HIGH | OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard |
| CVE-2026-31992 | 7.1 HIGH | OpenClaw < 2026.2.23 - Allowlist Exec-Guard Bypass via env -S |
| CVE-2026-32000 | 7.1 HIGH | OpenClaw < 2026.2.19 - Command Injection via Windows Shell Fallback in Lobster Tool Execut |
| CVE-2026-32023 | 7.1 HIGH | OpenClaw < 2026.2.24 - Approval Gating Bypass via Dispatch-Wrapper Depth-Cap Mismatch in s |
| CVE-2026-27566 | 7.1 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Wrapper Binary Unwrapping in system.run |
| CVE-2026-28460 | 7.1 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Shell Line-Continuation Command Substitution i |
| CVE-2026-31994 | 7.1 HIGH | OpenClaw < 2026.2.19 - Local Command Injection via Unsafe cmd Argument Handling in Windows |
Showing top 20 of 60 CVEs. View all on vendor page → →
No comments yet