Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-33579 | 9.9 CRITICAL | OpenClaw < 2026.3.28 - Privilege Escalation via Missing Caller Scope Validation in Device |
| CVE-2026-32917 | 9.8 CRITICAL | OpenClaw < 2026.3.13 - Remote Command Injection via Unsanitized iMessage Attachment Paths |
| CVE-2026-32916 | 9.4 CRITICAL | OpenClaw 2026.3.7 < 2026.3.11 - Authorization Bypass in Plugin Subagent Routes via Synthet |
| CVE-2026-32920 | 8.4 HIGH | OpenClaw < 2026.3.12 - Arbitrary Code Execution via Auto-Discovery of Workspace Plugins |
| CVE-2026-34504 | 8.3 HIGH | OpenClaw < 2026.3.28 - Server-Side Request Forgery via Unguarded Image Download in fal Pro |
| CVE-2026-33577 | 8.1 HIGH | OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve |
| CVE-2026-34503 | 8.1 HIGH | OpenClaw < 2026.3.28 - Incomplete WebSocket Session Termination on Device Removal and Toke |
| CVE-2026-32982 | 7.5 HIGH | OpenClaw < 2026.3.13 - Telegram Bot Token Exposure in Media Fetch Error Logs |
| CVE-2026-32988 | 7.5 HIGH | OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unvalidated Temporary File Creation |
| CVE-2026-32976 | 6.5 MEDIUM | OpenClaw < 2026.3.11 - Account-Scoped configWrites Policy Bypass via Channel Commands |
| CVE-2026-34505 | 6.5 MEDIUM | OpenClaw < 2026.3.12 - Webhook Rate Limiting Bypass via Pre-Authentication Secret Validati |
| CVE-2026-33576 | 6.5 MEDIUM | OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel |
| CVE-2026-33580 | 6.5 MEDIUM | OpenClaw < 2026.3.28 - Brute Force Attack via Missing Rate Limiting on Webhook Shared Secr |
| CVE-2026-33581 | 6.5 MEDIUM | OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters |
| CVE-2026-32977 | 6.3 MEDIUM | OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unanchored writeFile Commit Path |
| CVE-2026-32921 | 6.3 MEDIUM | OpenClaw < 2026.3.8 - Script Content Modification via Mutable Operand Binding in system.ru |
| CVE-2026-34506 | 4.3 MEDIUM | OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlis |
| CVE-2026-33578 | 4.3 MEDIUM | OpenClaw < 2026.3.28 - Sender Policy Allowlist Bypass via Policy Downgrade in Google Chat |
| CVE-2026-32970 | 2.5 LOW | OpenClaw < 2026.3.11 - Credential Fallback Logic Bypass via Unavailable Local Auth SecretR |
No comments yet