Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-35638 | 8.8 HIGH | OpenClaw < 2026.3.22 - Privilege Escalation via Self-Declared Scopes in Trusted-Proxy Cont |
| CVE-2026-35639 | 8.8 HIGH | OpenClaw < 2026.3.22 - Privilege Escalation via device.pair.approve Scope Validation |
| CVE-2026-35645 | 8.1 HIGH | OpenClaw < 2026.3.25 - Privilege Escalation via Synthetic operator.admin in deleteSession |
| CVE-2026-34512 | 8.1 HIGH | OpenClaw < 2026.3.25 - Improper Access Control in /sessions/:sessionKey/kill Endpoint |
| CVE-2026-35625 | 7.8 HIGH | OpenClaw < 2026.3.25 - Privilege Escalation via Silent Local Shared-Auth Reconnect |
| CVE-2026-35629 | 7.4 HIGH | OpenClaw < 2026.3.25 - Server-Side Request Forgery via Unguarded Configured Base URLs in C |
| CVE-2026-35637 | 7.3 HIGH | OpenClaw < 2026.3.22 - Premature Cite Expansion Before Authorization in Channel and DM |
| CVE-2026-35632 | 7.1 HIGH | OpenClaw <= 2026.2.22 - Symlink Traversal via IDENTITY.md appendFile in agents.create/upda |
| CVE-2026-35644 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Credential Exposure via baseUrl Fields in Gateway Snapshots |
| CVE-2026-35636 | 6.5 MEDIUM | OpenClaw 2026.3.11 < 2026.3.25 - Session Isolation Bypass via sessionId Resolution |
| CVE-2026-35631 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Missing Authorization Enforcement in Internal ACP Chat Commands |
| CVE-2026-35627 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Unauthenticated Cryptographic Work in Nostr Inbound DM Handling |
| CVE-2026-35618 | 6.5 MEDIUM | OpenClaw < 2026.3.23 - Replay Identity Drift via Query-Only Variants in Plivo V2 Verificat |
| CVE-2026-35622 | 5.9 MEDIUM | OpenClaw < 2026.3.22 - Improper Authentication Verification in Google Chat Webhook |
| CVE-2026-35633 | 5.3 MEDIUM | OpenClaw < 2026.3.22 - Unbounded Memory Allocation via Remote Media Error Responses |
| CVE-2026-35640 | 5.3 MEDIUM | OpenClaw < 2026.3.25 - Denial of Service via Unauthenticated Webhook Request Parsing |
| CVE-2026-35626 | 5.3 MEDIUM | OpenClaw < 2026.3.22 - Unauthenticated Resource Exhaustion via Voice Call Webhook |
| CVE-2026-35628 | 4.8 MEDIUM | OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Telegram Webhook Rate Limiting |
| CVE-2026-35646 | 4.8 MEDIUM | OpenClaw < 2026.3.25 - Pre-Authentication Rate-Limit Bypass in Webhook Token Validation |
| CVE-2026-35623 | 4.8 MEDIUM | OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Webhook Password Rate Limiting |
Showing top 20 of 25 CVEs. View all on vendor page → →
No comments yet