Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-35669 | 8.8 HIGH | OpenClaw < 2026.3.25 - Privilege Escalation via Gateway Plugin HTTP Authentication Scope |
| CVE-2026-35666 | 8.8 HIGH | OpenClaw < 2026.3.22 - Allowlist Bypass via Unregistered Time Dispatch Wrapper |
| CVE-2026-35643 | 8.8 HIGH | OpenClaw < 2026.3.22 - Arbitrary Code Execution via Unvalidated WebView JavascriptInterfac |
| CVE-2026-35663 | 8.8 HIGH | OpenClaw < 2026.3.25 - Privilege Escalation via Backend Reconnect Scope Self-Claim |
| CVE-2026-35660 | 8.1 HIGH | OpenClaw < 2026.3.23 - Insufficient Access Control in Gateway Agent Session Reset |
| CVE-2026-35653 | 8.1 HIGH | OpenClaw < 2026.3.24 - Incorrect Authorization in POST /reset-profile via browser.request |
| CVE-2026-35641 | 7.8 HIGH | OpenClaw < 2026.3.24 - Arbitrary Code Execution via .npmrc in Local Plugin/Hook Installati |
| CVE-2026-35668 | 7.7 HIGH | OpenClaw < 2026.3.24 - Sandbox Media Root Bypass via Unnormalized mediaUrl and fileUrl Par |
| CVE-2026-35650 | 7.5 HIGH | OpenClaw < 2026.3.22 - Environment Variable Override Bypass via Inconsistent Sanitization |
| CVE-2026-35656 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - XFF Loopback Spoofing Bypass in Canvas Authentication and Rate Limi |
| CVE-2026-35621 | 6.5 MEDIUM | OpenClaw < 2026.3.24 - Privilege Escalation via chat.send to Allowlist Persistence |
| CVE-2026-35649 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Settings Reconciliation Bypass via Empty Allowlist |
| CVE-2026-35652 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Unauthorized Action Execution via Callback Dispatch |
| CVE-2026-35657 | 6.5 MEDIUM | OpenClaw < 2026.3.25 - Authorization Bypass in HTTP Session History Route |
| CVE-2026-35658 | 6.5 MEDIUM | OpenClaw < 2026.3.2 - Filesystem Boundary Bypass in Image Tool |
| CVE-2026-35667 | 6.1 MEDIUM | OpenClaw < 2026.3.24 - Improper Process Termination via Unpatched killProcessTree in shell |
| CVE-2026-35670 | 5.9 MEDIUM | OpenClaw < 2026.3.22 - Webhook Reply Rebinding via Username Resolution in Synology Chat |
| CVE-2026-35655 | 5.7 MEDIUM | OpenClaw < 2026.3.22 - Identity Spoofing via rawInput Tool in ACP Permission Resolution |
| CVE-2026-35620 | 5.4 MEDIUM | OpenClaw < 2026.3.24 - Missing Authorization in /send and /allowlist Chat Commands |
| CVE-2026-35654 | 5.3 MEDIUM | OpenClaw < 2026.3.25 - Authorization Bypass in Microsoft Teams Feedback Invoke |
Showing top 20 of 29 CVEs. View all on vendor page → →
No comments yet