Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

OpenClaw — Vulnerabilities & Security Advisories 449

Browse all 449 CVE security advisories affecting OpenClaw. AI-powered Chinese analysis, POCs, and references for each vulnerability.

OpenClaw is a specialized software platform designed for automated threat intelligence aggregation and vulnerability management, primarily serving enterprise security operations centers. Historically, its codebase has exhibited a high frequency of critical flaws, with 428 CVEs documented to date. The most prevalent vulnerability classes include remote code execution (RCE) and cross-site scripting (XSS), often stemming from insufficient input validation in its web interface components. Additionally, privilege escalation issues have been frequently reported, allowing unauthorized users to gain administrative access. A notable incident in 2022 involved a critical RCE flaw that enabled attackers to execute arbitrary commands on unpatched servers, leading to widespread data exposure across multiple client networks. These recurring security deficiencies highlight significant challenges in the platform’s secure development lifecycle, necessitating rigorous patching and continuous monitoring for organizations relying on OpenClaw for their security infrastructure.

High2026-05-07
fix(sandbox): enforce CDP source-range restriction by default (#61404) · openclaw/openclaw@fbf11eb · GitHub
High2026-05-07
fix: harden direct CDP websocket validation (#60469) (thanks @eleqtri… · openclaw/openclaw@bc356cc · GitHub
High2026-05-07
fix(browser): re-check interaction-driven navigations (#63226) · openclaw/openclaw@5f5b3d7 · GitHub
High2026-05-07
fix(browser): gate sandbox noVNC helper auth · openclaw/openclaw@8dfbf32 · GitHub
High2026-05-07
fix(gateway): re-resolve HTTP auth per-request to honor credential ro… · openclaw/openclaw@acd4e0a · GitHub
High2026-05-07
Gateway HTTP endpoints re-resolve bearer auth after SecretRef rotation · Advisory · openclaw/openclaw · GitHub
High2026-05-07
fix(browser): apply three-phase interaction navigation guard to press… · openclaw/openclaw@e0b8ddc · GitHub
HighGHSA-525j-hqq2-66r42026-05-07
Sandbox browser CDP relay could expose DevTools protocol on 0.0.0.0 · Advisory · openclaw/openclaw · GitHub
Medium2026-05-07
fix(outbound): replay queued session context (#66025) · openclaw/openclaw@48aae82 · GitHub
High2026-05-07
fix(openshell): pin sandbox file reads (#69798) · openclaw/openclaw@9511901 · GitHub
High2026-05-07
fix(qqbot): add SSRF guard to direct-upload URL paths in uploadC2CMed… · openclaw/openclaw@49db424 · GitHub
High2026-05-07
fix(gateway): derive loopback owner context from token (#69796) · openclaw/openclaw@3cb1a56 · GitHub
High2026-05-07
fix(exec): block heredoc parameter expansion (#69795) · openclaw/openclaw@b2e8b7d · GitHub
Unknown2026-05-07
fix(dotenv): reserve workspace OPENCLAW env namespace (#69376) · openclaw/openclaw@018494f · GitHub
High2026-05-07
Harden Feishu webhook replay guards (#66707) · openclaw/openclaw@c8003f1 · GitHub
High2026-05-07
Align QMD memory reads with canonical memory paths (#66026) · openclaw/openclaw@37d5971 · GitHub
High2026-05-07
fix(openshell): pin host writes to sandbox root (#69797) · openclaw/openclaw@7be82d4 · GitHub
High2026-05-07
fix(matrix): block DM pairing-store entries from authorizing room con… · openclaw/openclaw@f8705f5 · GitHub
Critical2026-05-07
Feishu webhook and card-action validation now fail closed · Advisory · openclaw/openclaw · GitHub
High2026-05-07
fix(matrix): skip pairing-store reads for room auth (#67325) · openclaw/openclaw@2bfd808 · GitHub

Showing up to 20 recent security advisories. View all →

This page lists every published CVE security advisory associated with OpenClaw. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.