Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-35639 | 8.8 HIGH | OpenClaw < 2026.3.22 - Privilege Escalation via device.pair.approve Scope Validation |
| CVE-2026-35638 | 8.8 HIGH | OpenClaw < 2026.3.22 - Privilege Escalation via Self-Declared Scopes in Trusted-Proxy Cont |
| CVE-2026-34512 | 8.1 HIGH | OpenClaw < 2026.3.25 - Improper Access Control in /sessions/:sessionKey/kill Endpoint |
| CVE-2026-35625 | 7.8 HIGH | OpenClaw < 2026.3.25 - Privilege Escalation via Silent Local Shared-Auth Reconnect |
| CVE-2026-35629 | 7.4 HIGH | OpenClaw < 2026.3.25 - Server-Side Request Forgery via Unguarded Configured Base URLs in C |
| CVE-2026-35637 | 7.3 HIGH | OpenClaw < 2026.3.22 - Premature Cite Expansion Before Authorization in Channel and DM |
| CVE-2026-35632 | 7.1 HIGH | OpenClaw <= 2026.2.22 - Symlink Traversal via IDENTITY.md appendFile in agents.create/upda |
| CVE-2026-35631 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Missing Authorization Enforcement in Internal ACP Chat Commands |
| CVE-2026-35618 | 6.5 MEDIUM | OpenClaw < 2026.3.23 - Replay Identity Drift via Query-Only Variants in Plivo V2 Verificat |
| CVE-2026-35627 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Unauthenticated Cryptographic Work in Nostr Inbound DM Handling |
| CVE-2026-35636 | 6.5 MEDIUM | OpenClaw 2026.3.11 < 2026.3.25 - Session Isolation Bypass via sessionId Resolution |
| CVE-2026-35644 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Credential Exposure via baseUrl Fields in Gateway Snapshots |
| CVE-2026-35622 | 5.9 MEDIUM | OpenClaw < 2026.3.22 - Improper Authentication Verification in Google Chat Webhook |
| CVE-2026-35633 | 5.3 MEDIUM | OpenClaw < 2026.3.22 - Unbounded Memory Allocation via Remote Media Error Responses |
| CVE-2026-35640 | 5.3 MEDIUM | OpenClaw < 2026.3.25 - Denial of Service via Unauthenticated Webhook Request Parsing |
| CVE-2026-35626 | 5.3 MEDIUM | OpenClaw < 2026.3.22 - Unauthenticated Resource Exhaustion via Voice Call Webhook |
| CVE-2026-35634 | 5.1 MEDIUM | OpenClaw < 2026.3.23 - Authentication Bypass via Local-Direct Requests in Canvas Gateway |
| CVE-2026-35646 | 4.8 MEDIUM | OpenClaw < 2026.3.25 - Pre-Authentication Rate-Limit Bypass in Webhook Token Validation |
| CVE-2026-35635 | 4.8 MEDIUM | OpenClaw < 2026.3.22 - Webhook Path Route Replacement Vulnerability in Synology Chat |
| CVE-2026-35628 | 4.8 MEDIUM | OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Telegram Webhook Rate Limiting |
Showing top 20 of 25 CVEs. View all on vendor page → →
No comments yet