Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32922 | 9.9 CRITICAL | OpenClaw < 2026.3.11 - Privilege Escalation via Unvalidated Scope in device.token.rotate |
| CVE-2026-32924 | 9.8 CRITICAL | OpenClaw < 2026.3.12 - Authorization Bypass via Misclassified Reaction Events in Feishu |
| CVE-2026-32987 | 9.8 CRITICAL | OpenClaw < 2026.3.13 - Bootstrap Setup Code Replay via Device Pairing |
| CVE-2026-32973 | 9.8 CRITICAL | OpenClaw < 2026.3.11 - Exec Allowlist Pattern Overmatch via POSIX Path Normalization |
| CVE-2026-32975 | 9.8 CRITICAL | OpenClaw < 2026.3.12 - Weak Authorization via Mutable Group Names in Zalouser Allowlist |
| CVE-2026-32914 | 8.8 HIGH | OpenClaw < 2026.3.12 - Insufficient Access Control in /config and /debug Endpoints |
| CVE-2026-33573 | 8.8 HIGH | OpenClaw < 2026.3.11 - Workspace Boundary Bypass via Agent RPC Parameters |
| CVE-2026-32974 | 8.6 HIGH | OpenClaw < 2026.3.12 - Forged Event Injection via Feishu Webhook Verification Token |
| CVE-2026-33572 | 8.4 HIGH | OpenClaw < 2026.2.17 - Insufficient File Permissions in Session Transcript Files |
| CVE-2026-32918 | 8.4 HIGH | OpenClaw < 2026.3.11 - Session Sandbox Escape via session_status Tool |
| CVE-2026-32978 | 8.0 HIGH | OpenClaw < 2026.3.11 - Approval Bypass via Unrecognized Script Runners |
| CVE-2026-32980 | 7.5 HIGH | OpenClaw < 2026.3.13 - Resource Exhaustion via Unauthenticated Telegram Webhook Request |
| CVE-2026-33575 | 7.5 HIGH | OpenClaw < 2026.3.12 - Long-lived Credential Exposure in Pairing Setup Codes |
| CVE-2026-32979 | 7.3 HIGH | OpenClaw < 2026.3.11 - Unbound Interpreter and Runtime Commands Bypass in node-host Approv |
| CVE-2026-32972 | 7.1 HIGH | OpenClaw < 2026.3.11 - Authorization Bypass in Browser Profile Management via browser.requ |
| CVE-2026-33574 | 6.2 MEDIUM | OpenClaw < 2026.3.8 - Path Traversal via Tools Root Rebinding in Skills Download |
| CVE-2026-32919 | 6.1 MEDIUM | OpenClaw < 2026.3.11 - Unauthorized Session Reset via agent Slash Commands |
| CVE-2026-32923 | 5.4 MEDIUM | OpenClaw < 2026.3.11 - Authorization Bypass in Discord Guild Reaction Allowlist Enforcemen |
No comments yet