Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-41349 | 8.8 HIGH | OpenClaw < 2026.3.28 - Agentic Consent Bypass via config.patch |
| CVE-2026-41352 | 8.8 HIGH | OpenClaw < 2026.3.31 - Remote Code Execution via Node Scope Gate Bypass |
| CVE-2026-41353 | 8.1 HIGH | OpenClaw < 2026.3.22 - allowProfiles Bypass via Profile Mutation and Runtime Selection |
| CVE-2026-41336 | 7.8 HIGH | OpenClaw < 2026.3.31 - Arbitrary Hook Code Execution via OPENCLAW_BUNDLED_HOOKS_DIR Enviro |
| CVE-2026-41342 | 7.3 HIGH | OpenClaw < 2026.3.28 - Unauthenticated Discovery Endpoint Credential Exfiltration via Remo |
| CVE-2026-41355 | 7.3 HIGH | OpenShell < 2026.3.28 - Arbitrary Code Execution via Mirror Mode Sandbox File Conversion |
| CVE-2026-41359 | 7.1 HIGH | OpenClaw < 2026.3.28 - Privilege Escalation via operator.write to Admin-Class Telegram Con |
| CVE-2026-41361 | 7.1 HIGH | OpenClaw < 2026.3.28 - SSRF Guard Bypass via IPv6 Special-Use Ranges |
| CVE-2026-41347 | 7.1 HIGH | OpenClaw < 2026.3.31 - Cross-Site Request Forgery via Missing Browser-Origin Validation in |
| CVE-2026-41360 | 6.7 MEDIUM | OpenClaw < 2026.4.2 - Approval Integrity Bypass in pnpm dlx Local Script Binding |
| CVE-2026-41334 | 6.5 MEDIUM | OpenClaw < 2026.3.31 - Decompression Bomb Denial of Service via Image Pixel-Limit Guard By |
| CVE-2026-41340 | 6.5 MEDIUM | OpenClaw < 2026.3.31 - Authentication Boundary Bypass via Telegram Legacy allowFrom Migrat |
| CVE-2026-41348 | 5.4 MEDIUM | OpenClaw < 2026.3.31 - Group DM Channel Allowlist Bypass via Discord Slash Commands |
| CVE-2026-41356 | 5.4 MEDIUM | OpenClaw < 2026.3.31 - Incomplete WebSocket Session Termination in device.token.rotate |
| CVE-2026-41909 | 5.4 MEDIUM | OpenClaw < 2026.4.20 - Improper Authorization in Paired-Device Pairing Actions |
| CVE-2026-41344 | 5.4 MEDIUM | OpenClaw < 2026.3.28 - Privilege Escalation via chat.send /verbose Parameter |
| CVE-2026-41358 | 5.4 MEDIUM | OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context |
| CVE-2026-41341 | 5.4 MEDIUM | OpenClaw < 2026.3.31 - Component Interaction Misclassification in Discord Extension |
| CVE-2026-41332 | 5.3 MEDIUM | OpenClaw < 2026.3.28 - Code Execution via Missing Environment Variable Blocklist |
| CVE-2026-41335 | 5.3 MEDIUM | OpenClaw < 2026.3.31 - Information Disclosure via Control UI Bootstrap JSON |
Showing top 20 of 32 CVEs. View all on vendor page → →
No comments yet