Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-43566 | 9.1 CRITICAL | OpenClaw 2026.4.7 < 2026.4.14 - Privilege Escalation via Untrusted Webhook Wake Events |
| CVE-2026-43534 | 9.1 CRITICAL | OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events |
| CVE-2026-43571 | 8.8 HIGH | OpenClaw < 2026.4.10 - Untrusted Workspace Plugin Shadow Resolution in Channel Setup |
| CVE-2026-42434 | 8.8 HIGH | OpenClaw 2026.4.5 < 2026.4.10 - Sandbox Escape via host Parameter Override in Exec Routing |
| CVE-2026-42435 | 8.8 HIGH | OpenClaw 2026.2.22 < 2026.4.12 - Shell-Wrapper Detection Bypass via Environment Variable A |
| CVE-2026-43569 | 8.8 HIGH | OpenClaw < 2026.4.9 - Untrusted Provider Plugin Auto-enablement via Workspace Provider Aut |
| CVE-2026-43530 | 8.8 HIGH | OpenClaw 2026.2.23 < 2026.4.12 - Weakened Exec Approval Binding via busybox and toybox App |
| CVE-2026-43533 | 8.6 HIGH | OpenClaw < 2026.4.10 - Arbitrary Local File Read via QQBot Media Tags |
| CVE-2026-42439 | 8.5 HIGH | OpenClaw < 2026.4.10 - SSRF Policy Bypass in Browser Tabs Action Routes |
| CVE-2026-43526 | 8.2 HIGH | OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling |
| CVE-2026-43527 | 7.7 HIGH | OpenClaw < 2026.4.14 - Server-Side Request Forgery via Private Network Navigation |
| CVE-2026-42438 | 7.7 HIGH | OpenClaw 2026.4.9 < 2026.4.10 - Sender Policy Bypass in Host Media Attachment Reads |
| CVE-2026-43532 | 7.7 HIGH | OpenClaw 2026.4.7 < 2026.4.10 - Sandbox Media Normalization Bypass via Discord Event Cover |
| CVE-2026-42436 | 7.7 HIGH | OpenClaw < 2026.4.14 - Internal Page Content Exposure via Browser Snapshot and Screenshot |
| CVE-2026-43573 | 7.7 HIGH | OpenClaw < 2026.4.10 - SSRF Policy Bypass in Existing-Session Browser Interaction Routes |
| CVE-2026-42437 | 7.5 HIGH | OpenClaw 2026.4.9 < 2026.4.10 - Denial of Service via Oversized WebSocket Frames in Voice- |
| CVE-2026-43531 | 7.3 HIGH | OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File |
| CVE-2026-43528 | 6.5 MEDIUM | OpenClaw < 2026.4.14 - Redaction Bypass via sourceConfig and runtimeConfig Aliases |
| CVE-2026-43574 | 6.5 MEDIUM | OpenClaw < 2026.4.12 - Improper Authorization via Empty Approver Lists |
| CVE-2026-43567 | 6.5 MEDIUM | OpenClaw < 2026.4.10 - Path Traversal in screen_record outPath Parameter |
Showing top 20 of 26 CVEs. View all on vendor page → →
No comments yet