高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-43566 | 9.1 CRITICAL | OpenClaw 2026.4.7 < 2026.4.14 - Privilege Escalation via Untrusted Webhook Wake Events |
| CVE-2026-43534 | 9.1 CRITICAL | OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events |
| CVE-2026-42434 | 8.8 HIGH | OpenClaw 2026.4.5 < 2026.4.10 - Sandbox Escape via host Parameter Override in Exec Routing |
| CVE-2026-43571 | 8.8 HIGH | OpenClaw < 2026.4.10 - Untrusted Workspace Plugin Shadow Resolution in Channel Setup |
| CVE-2026-42435 | 8.8 HIGH | OpenClaw 2026.2.22 < 2026.4.12 - Shell-Wrapper Detection Bypass via Environment Variable A |
| CVE-2026-43569 | 8.8 HIGH | OpenClaw < 2026.4.9 - Untrusted Provider Plugin Auto-enablement via Workspace Provider Aut |
| CVE-2026-43533 | 8.6 HIGH | OpenClaw < 2026.4.10 - Arbitrary Local File Read via QQBot Media Tags |
| CVE-2026-42439 | 8.5 HIGH | OpenClaw < 2026.4.10 - SSRF Policy Bypass in Browser Tabs Action Routes |
| CVE-2026-43526 | 8.2 HIGH | OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling |
| CVE-2026-43573 | 7.7 HIGH | OpenClaw < 2026.4.10 - SSRF Policy Bypass in Existing-Session Browser Interaction Routes |
| CVE-2026-42436 | 7.7 HIGH | OpenClaw < 2026.4.14 - Internal Page Content Exposure via Browser Snapshot and Screenshot |
| CVE-2026-42438 | 7.7 HIGH | OpenClaw 2026.4.9 < 2026.4.10 - Sender Policy Bypass in Host Media Attachment Reads |
| CVE-2026-43527 | 7.7 HIGH | OpenClaw < 2026.4.14 - Server-Side Request Forgery via Private Network Navigation |
| CVE-2026-43532 | 7.7 HIGH | OpenClaw 2026.4.7 < 2026.4.10 - Sandbox Media Normalization Bypass via Discord Event Cover |
| CVE-2026-42437 | 7.5 HIGH | OpenClaw 2026.4.9 < 2026.4.10 - Denial of Service via Oversized WebSocket Frames in Voice- |
| CVE-2026-43531 | 7.3 HIGH | OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File |
| CVE-2026-43535 | 6.8 MEDIUM | OpenClaw < 2026.4.14 - Authorization Context Reuse in Collect-Mode Queue Batches |
| CVE-2026-43528 | 6.5 MEDIUM | OpenClaw < 2026.4.14 - Redaction Bypass via sourceConfig and runtimeConfig Aliases |
| CVE-2026-43567 | 6.5 MEDIUM | OpenClaw < 2026.4.10 - Path Traversal in screen_record outPath Parameter |
| CVE-2026-43568 | 6.5 MEDIUM | OpenClaw 2026.4.5 < 2026.4.10 - Privilege Escalation via Memory Dreaming Configuration in |
Showing 20 of 26 CVEs. View all on vendor page →
まだコメントはありません