Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32042 | 8.8 HIGH | OpenClaw < 2026.2.25 - Privilege Escalation via Unpaired Device Identity in Shared Gateway |
| CVE-2026-32051 | 8.8 HIGH | OpenClaw < 2026.3.1 - Authorization Bypass in Agent Runs via Owner-Only Tool Access |
| CVE-2026-32064 | 7.7 HIGH | OpenClaw < 2026.2.21 - Missing VNC Authentication in Sandbox Browser noVNC Observer |
| CVE-2026-32055 | 7.6 HIGH | OpenClaw < 2026.2.26 - Workspace Path Boundary Bypass via Non-existent Symlink |
| CVE-2026-32056 | 7.5 HIGH | OpenClaw < 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Inject |
| CVE-2026-32048 | 7.5 HIGH | OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn |
| CVE-2026-32049 | 7.5 HIGH | OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass |
| CVE-2026-32057 | 7.1 HIGH | OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter |
| CVE-2026-32043 | 6.5 MEDIUM | OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Par |
| CVE-2026-32054 | 6.5 MEDIUM | OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling |
| CVE-2026-32053 | 6.5 MEDIUM | OpenClaw < 2026.2.23 - Twilio Webhook Replay Bypass via Randomized Event ID Normalization |
| CVE-2026-32052 | 6.4 MEDIUM | OpenClaw < 2026.2.24 - Hidden Command Execution via Shell-Wrapper Positional argv Carriers |
| CVE-2026-32045 | 5.9 MEDIUM | OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscal |
| CVE-2026-32044 | 5.5 MEDIUM | OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation |
| CVE-2026-32898 | 5.4 MEDIUM | OpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata |
| CVE-2026-32895 | 5.4 MEDIUM | OpenClaw < 2026.2.26 - Sender Authorization Bypass in Slack System Event Handlers |
| CVE-2026-32046 | 5.3 MEDIUM | OpenClaw < 2026.2.21 - OS-level Sandbox Bypass via --no-sandbox Flag |
| CVE-2026-32896 | 4.8 MEDIUM | OpenClaw < 2026.2.21 - Unauthenticated Webhook Access via Passwordless Fallback in BlueBub |
| CVE-2026-32065 | 4.8 MEDIUM | OpenClaw < 2026.2.25 - Approval Identity Mismatch in system.run Command Execution |
| CVE-2026-32899 | 4.3 MEDIUM | OpenClaw < 2026.2.25 - Sender Policy Bypass in Slack Reaction and Pin Event Handlers |
Showing top 20 of 24 CVEs. View all on vendor page → →
No comments yet