Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-45006 | 8.8 HIGH | OpenClaw < 2026.4.23 - Unsafe Config Mutation via Gateway Tool Denylist Bypass |
| CVE-2026-45223 | 8.8 HIGH | Crabbox < 0.9.0 Authentication Bypass via Admin Claim Injection |
| CVE-2026-45004 | 7.8 HIGH | OpenClaw < 2026.4.23 - Arbitrary Code Execution via setup-api.js in Current Working Direct |
| CVE-2026-44995 | 7.3 HIGH | OpenClaw < 2026.4.20 - Arbitrary Code Execution via MCP stdio Environment Variables |
| CVE-2026-45001 | 7.1 HIGH | OpenClaw < 2026.4.20 - Gateway Config Mutation Guard Bypass via Agent Tool Access |
| CVE-2026-45005 | 6.0 MEDIUM | OpenClaw < 2026.4.23 - Webhook Route Secret Cache Not Invalidated After Rotation |
| CVE-2026-44993 | 5.4 MEDIUM | OpenClaw < 2026.4.20 - Direct Message Misclassification in Feishu Card Actions |
| CVE-2026-44998 | 5.4 MEDIUM | OpenClaw < 2026.4.20 - Tool Policy Bypass via Bundled MCP/LSP Tools |
| CVE-2026-44999 | 5.3 MEDIUM | OpenClaw < 2026.4.20 - Improper Trust Labeling in Isolated Cron Awareness Events |
| CVE-2026-44994 | 5.3 MEDIUM | OpenClaw < 2026.4.22 - Authentication Bypass in Gateway Control UI Bootstrap Config Endpoi |
| CVE-2026-45002 | 5.3 MEDIUM | OpenClaw < 2026.4.20 - Hook Session-Key Bypass via Template Mapping |
| CVE-2026-45000 | 5.0 MEDIUM | OpenClaw < 2026.4.20 - Server-Side Request Forgery via Browser CDP Profile Creation |
| CVE-2026-45003 | 5.0 MEDIUM | OpenClaw < 2026.4.22 - Connector Endpoint Host Override via Workspace dotenv Files |
| CVE-2026-44992 | 5.0 MEDIUM | OpenClaw 2026.4.5 < 2026.4.20 - MiniMax API Host Override via Workspace dotenv |
| CVE-2026-44997 | 4.3 MEDIUM | OpenClaw < 2026.4.22 - Security Envelope Constraint Bypass in ACP Child Sessions |
| CVE-2026-44991 | 4.2 MEDIUM | OpenClaw < 2026.4.21 - Authorization Bypass in Owner-Enforced Commands via Wildcard Channe |
| CVE-2026-44996 | 3.7 LOW | OpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding |
No comments yet