Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32042 | 8.8 HIGH | OpenClaw < 2026.2.25 - Privilege Escalation via Unpaired Device Identity in Shared Gateway |
| CVE-2026-32051 | 8.8 HIGH | OpenClaw < 2026.3.1 - Authorization Bypass in Agent Runs via Owner-Only Tool Access |
| CVE-2026-32064 | 7.7 HIGH | OpenClaw < 2026.2.21 - Missing VNC Authentication in Sandbox Browser noVNC Observer |
| CVE-2026-32055 | 7.6 HIGH | OpenClaw < 2026.2.26 - Workspace Path Boundary Bypass via Non-existent Symlink |
| CVE-2026-32048 | 7.5 HIGH | OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn |
| CVE-2026-32049 | 7.5 HIGH | OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass |
| CVE-2026-32056 | 7.5 HIGH | OpenClaw < 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Inject |
| CVE-2026-32054 | 6.5 MEDIUM | OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling |
| CVE-2026-32043 | 6.5 MEDIUM | OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Par |
| CVE-2026-32053 | 6.5 MEDIUM | OpenClaw < 2026.2.23 - Twilio Webhook Replay Bypass via Randomized Event ID Normalization |
| CVE-2026-32052 | 6.4 MEDIUM | OpenClaw < 2026.2.24 - Hidden Command Execution via Shell-Wrapper Positional argv Carriers |
| CVE-2026-32045 | 5.9 MEDIUM | OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscal |
| CVE-2026-32044 | 5.5 MEDIUM | OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation |
| CVE-2026-32895 | 5.4 MEDIUM | OpenClaw < 2026.2.26 - Sender Authorization Bypass in Slack System Event Handlers |
| CVE-2026-32898 | 5.4 MEDIUM | OpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata |
| CVE-2026-32046 | 5.3 MEDIUM | OpenClaw < 2026.2.21 - OS-level Sandbox Bypass via --no-sandbox Flag |
| CVE-2026-32065 | 4.8 MEDIUM | OpenClaw < 2026.2.25 - Approval Identity Mismatch in system.run Command Execution |
| CVE-2026-32896 | 4.8 MEDIUM | OpenClaw < 2026.2.21 - Unauthenticated Webhook Access via Passwordless Fallback in BlueBub |
| CVE-2026-32899 | 4.3 MEDIUM | OpenClaw < 2026.2.25 - Sender Policy Bypass in Slack Reaction and Pin Event Handlers |
| CVE-2026-32067 | 3.7 LOW | OpenClaw < 2026.2.26 - Cross-Account Authorization Bypass in DM Pairing Store |
Showing top 20 of 24 CVEs. View all on vendor page → →
No comments yet