Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-43575 | 9.8 CRITICAL | OpenClaw 2026.2.21 < 2026.4.10 - Authentication Bypass in Sandbox noVNC Helper Route |
| CVE-2026-44109 | 9.8 CRITICAL | OpenClaw < 2026.4.15 - Authentication Bypass in Feishu Webhook and Card-Action Validation |
| CVE-2026-43581 | 9.6 CRITICAL | OpenClaw < 2026.4.10 - Chrome DevTools Protocol Exposure via Overly Broad CDP Relay Bindin |
| CVE-2026-43578 | 9.1 CRITICAL | OpenClaw 2026.3.31 < 2026.4.10 - Privilege Escalation via Missed Async Exec Completion Eve |
| CVE-2026-44110 | 8.8 HIGH | OpenClaw < 2026.4.15 - Authorization Bypass in Matrix Room Control Commands via DM Pairin |
| CVE-2026-44115 | 8.8 HIGH | OpenClaw < 2026.4.22 - Shell Expansion Bypass in Unquoted Heredocs via Exec Allowlist |
| CVE-2026-43584 | 8.8 HIGH | OpenClaw < 2026.4.10 - Insufficient Environment Variable Denylist in Exec Policy |
| CVE-2026-44116 | 8.6 HIGH | OpenClaw < 2026.4.22 - Server-Side Request Forgery in Zalo Photo URL Validation |
| CVE-2026-43585 | 8.1 HIGH | OpenClaw < 2026.4.15 - Bearer Token Validation Bypass via Stale SecretRef Resolution |
| CVE-2026-44114 | 7.8 HIGH | OpenClaw < 2026.4.20 - Environment Variable Namespace Collision via Workspace dotenv |
| CVE-2026-44118 | 7.8 HIGH | OpenClaw < 2026.4.22 - Owner Context Spoofing via Bearer Token Header |
| CVE-2026-43576 | 7.7 HIGH | OpenClaw < 2026.4.5 - Second-hop SSRF via CDP /json/version WebSocket URL |
| CVE-2026-43579 | 6.5 MEDIUM | OpenClaw < 2026.4.10 - Insufficient Access Control in Nostr Profile Mutation Routes |
| CVE-2026-43577 | 6.5 MEDIUM | OpenClaw < 2026.4.9 - Arbitrary File Read via Browser Interaction Routes |
| CVE-2026-43582 | 6.3 MEDIUM | OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname Validation Bypass |
| CVE-2026-44117 | 5.8 MEDIUM | OpenClaw < 2026.4.20 - Server-Side Request Forgery in QQBot Direct Media Upload |
| CVE-2026-43583 | 5.3 MEDIUM | OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Policy Context in Delivery Queue Recov |
| CVE-2026-44113 | 5.3 MEDIUM | OpenClaw < 2026.4.22 - Time-of-Check/Time-of-Use Race Condition in OpenShell FS Bridge |
| CVE-2026-44112 | 5.3 MEDIUM | OpenClaw < 2026.4.22 - Symlink Swap Race Condition in OpenShell FS Bridge Writes |
| CVE-2026-44111 | 4.3 MEDIUM | OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get |
No comments yet