Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-41371 | 8.5 HIGH | OpenClaw < 2026.3.28 - Privilege Escalation via chat.send Reset Command |
| CVE-2026-41364 | 8.1 HIGH | OpenClaw < 2026.3.31 - Arbitrary File Write via Symlink Following in SSH Sandbox Tar Uploa |
| CVE-2026-41370 | 6.5 MEDIUM | OpenClaw < 2026.3.31 - Path Traversal via Inbound Channel Attachment Path in ACP Dispatch |
| CVE-2026-41368 | 6.5 MEDIUM | OpenClaw < 2026.3.28 - Environment Variable Disclosure via jq $ENV Filter Bypass |
| CVE-2026-41369 | 6.5 MEDIUM | OpenClaw < 2026.3.31 - Insufficient Environment Variable Sanitization in Host Execution |
| CVE-2026-41372 | 5.8 MEDIUM | OpenClaw < 2026.4.2 - Loopback Protection Bypass via Trailing-Dot Localhost in CDP Discove |
| CVE-2026-41366 | 5.5 MEDIUM | OpenClaw < 2026.3.31 - Arbitrary Host File Read via appendLocalMediaParentRoots Self-White |
| CVE-2026-41365 | 5.4 MEDIUM | OpenClaw < 2026.3.31 - Sender Allowlist Bypass via Graph API Thread History |
| CVE-2026-41363 | 5.3 MEDIUM | OpenClaw 2026.2.6 < 2026.3.28 - Arbitrary File Read via Feishu upload_image Parameter |
| CVE-2026-41367 | 5.0 MEDIUM | OpenClaw 2026.2.14 < 2026.3.28 - Policy Enforcement Bypass in Discord Component Interactio |
No comments yet