Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-43566 | 9.1 CRITICAL | OpenClaw 2026.4.7 < 2026.4.14 - Privilege Escalation via Untrusted Webhook Wake Events |
| CVE-2026-43534 | 9.1 CRITICAL | OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events |
| CVE-2026-42434 | 8.8 HIGH | OpenClaw 2026.4.5 < 2026.4.10 - Sandbox Escape via host Parameter Override in Exec Routing |
| CVE-2026-43571 | 8.8 HIGH | OpenClaw < 2026.4.10 - Untrusted Workspace Plugin Shadow Resolution in Channel Setup |
| CVE-2026-42435 | 8.8 HIGH | OpenClaw 2026.2.22 < 2026.4.12 - Shell-Wrapper Detection Bypass via Environment Variable A |
| CVE-2026-43569 | 8.8 HIGH | OpenClaw < 2026.4.9 - Untrusted Provider Plugin Auto-enablement via Workspace Provider Aut |
| CVE-2026-43530 | 8.8 HIGH | OpenClaw 2026.2.23 < 2026.4.12 - Weakened Exec Approval Binding via busybox and toybox App |
| CVE-2026-43533 | 8.6 HIGH | OpenClaw < 2026.4.10 - Arbitrary Local File Read via QQBot Media Tags |
| CVE-2026-42439 | 8.5 HIGH | OpenClaw < 2026.4.10 - SSRF Policy Bypass in Browser Tabs Action Routes |
| CVE-2026-43526 | 8.2 HIGH | OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling |
| CVE-2026-43573 | 7.7 HIGH | OpenClaw < 2026.4.10 - SSRF Policy Bypass in Existing-Session Browser Interaction Routes |
| CVE-2026-42436 | 7.7 HIGH | OpenClaw < 2026.4.14 - Internal Page Content Exposure via Browser Snapshot and Screenshot |
| CVE-2026-42438 | 7.7 HIGH | OpenClaw 2026.4.9 < 2026.4.10 - Sender Policy Bypass in Host Media Attachment Reads |
| CVE-2026-43527 | 7.7 HIGH | OpenClaw < 2026.4.14 - Server-Side Request Forgery via Private Network Navigation |
| CVE-2026-43532 | 7.7 HIGH | OpenClaw 2026.4.7 < 2026.4.10 - Sandbox Media Normalization Bypass via Discord Event Cover |
| CVE-2026-42437 | 7.5 HIGH | OpenClaw 2026.4.9 < 2026.4.10 - Denial of Service via Oversized WebSocket Frames in Voice- |
| CVE-2026-43531 | 7.3 HIGH | OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File |
| CVE-2026-43535 | 6.8 MEDIUM | OpenClaw < 2026.4.14 - Authorization Context Reuse in Collect-Mode Queue Batches |
| CVE-2026-43567 | 6.5 MEDIUM | OpenClaw < 2026.4.10 - Path Traversal in screen_record outPath Parameter |
| CVE-2026-43568 | 6.5 MEDIUM | OpenClaw 2026.4.5 < 2026.4.10 - Privilege Escalation via Memory Dreaming Configuration in |
Showing top 20 of 26 CVEs. View all on vendor page → →
No comments yet