Skip to content
Threat Feed

Tag

Openclaw

26 briefs RSS
high advisory

OpenClaw QQ Bot Media Download SSRF Vulnerability

OpenClaw before 2026.4.8 is vulnerable to server-side request forgery (SSRF) in QQ Bot media download paths, allowing attackers to bypass SSRF protections and access internal resources.

OpenClaw ssrf cve-2026-41914
2r 2t 1c
high advisory

OpenClaw Arbitrary Directory Deletion Vulnerability

OpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.

OpenClaw cve-2026-41383 directory-traversal file-deletion
2r 1t 1c
high advisory

OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)

OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.

openclaw code-execution trust-boundary plugin
2r 1t 1c
medium advisory

OpenClaw Webchat Media Embedding Local-Root Containment Bypass

A vulnerability in OpenClaw versions 2026.4.7 to before 2026.4.15 allows a crafted tool-result media reference to cause the host to attempt local file reads or Windows UNC/network path access, potentially disclosing files or network credentials.

openclaw local-file-inclusion unc-path
2r 2t
high advisory

OpenClaw Environment Variable Injection Vulnerability

The openclaw package versions prior to 2026.4.10 are vulnerable to environment variable injection, where the exec environment policy missed interpreter startup variables allowing operator-supplied environment overrides to influence downstream execution or network behavior, addressed in versions 2026.4.10 and later.

npm openclaw environment-variable-injection vulnerability
2r 1t
high advisory

OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)

OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.

cve-2026-35660 openclaw access-control privilege-escalation
2r 1t 1c 5i
high advisory

OpenClaw Path Traversal Vulnerability (CVE-2026-35668)

OpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.

path-traversal vulnerability openclaw
2r 1t 1c
high advisory

OpenClaw RCE via Build Tool Environment Variable Injection

OpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.

rce environment-variable-injection openclaw
2r 2t
high advisory

OpenClaw Trust Model Vulnerability: System Prompt Channel Injection

OpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.

openclaw trust-model system-prompt-injection npm
2r
critical advisory

OpenClaw TOCTOU Race Condition Leads to Sandbox Escape

A critical time-of-check time-of-use (TOCTOU) vulnerability in OpenClaw's remote file system bridge allows a sandbox escape by exploiting the delay between path validation and file reading, affecting versions up to 2026.3.28.

openclaw sandbox-escape toctou
2r 1t
high advisory

OpenClaw Incomplete Scope Clearing Allows Privilege Escalation

An incomplete fix in OpenClaw versions 2026.3.28 and earlier allows for operator.admin privilege escalation via trusted-proxy authentication mode, which is fixed in version 2026.3.31.

privilege-escalation web-application openclaw
2r 1t
medium advisory

OpenClaw Arbitrary File Read and Credential Exfiltration Vulnerability

The openclaw package is vulnerable to arbitrary file read and credential exfiltration due to media local roots self-whitelisting in `appendLocalMediaParentRoots`, allowing a model to initiate arbitrary host file reads, potentially leading to credential exfiltration.

arbitrary-file-read credential-exfiltration openclaw npm
2r 1t
high advisory

OpenClaw NPM Package Vulnerable to Python Package Index Redirection

The openclaw npm package is vulnerable to Python package-index redirection through host execution due to improper sanitization of `PIP_INDEX_URL` and `UV_INDEX_URL`, affecting versions 2026.3.28 and earlier.

openclaw npm package-index-redirection environment-variable-injection
2r
high advisory

OpenClaw Gateway Unauthorized Session Reset Vulnerability

A vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.

openclaw session-reset privilege-escalation
2r 1t
medium advisory

OpenClaw Microsoft Teams Plugin Sender Allowlist Bypass (CVE-2026-34506)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin, allowing unauthorized senders to bypass intended authorization checks due to improper handling of empty groupAllowFrom parameters, potentially leading to information disclosure.

cve-2026-34506 openclaw microsoft teams allowlist bypass
2r 2t 1c
critical advisory

OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)

OpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.

command-injection imessage openclaw
2r 1t 1c
high advisory

OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability

The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.

openclaw vulnerability authorization
2r 1t
high advisory

OpenClaw SSRF Vulnerability via Unguarded Configured Base URLs

OpenClaw versions 2026.3.24 and earlier are vulnerable to Server-Side Request Forgery (SSRF) because of unguarded configured base URLs in multiple channel extensions, allowing attackers to potentially access internal resources.

ssrf openclaw cve-2026-28476
2r 1t
high advisory

OpenClaw Credential Exposure via Leaked Pairing Codes

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.

credential-access vulnerability openclaw
2r 1t
high advisory

OpenClaw Code Execution via Script Modification (CVE-2026-32979)

OpenClaw before 2026.3.11 is vulnerable to an approval integrity issue (CVE-2026-32979) allowing attackers to execute arbitrary code by modifying approved local scripts before they are executed.

cve-2026-32979 code-execution openclaw
2r 1t
critical advisory

OpenClaw Exec Allowlist Bypass via POSIX Path Overmatching (CVE-2026-32973)

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability (CVE-2026-32973) due to improper normalization of patterns, allowing attackers to execute unintended commands via wildcard matching in POSIX paths.

cve-2026-32973 openclaw allowlist-bypass
2r 1t
high advisory

OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.

openclaw sandbox-escape authorization
2r 1t
high advisory

OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope

The openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.

openclaw privilege-escalation vulnerability
2r 1t
high advisory

OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update

OpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.

openclaw symlink-traversal vulnerability npm rce persistence
2r 2t
high advisory

OpenClaw ACP Chat Command Injection Vulnerability

A vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.

openclaw acp chat-command-injection vulnerability
2r
high advisory

OpenClaw Improper Header Validation Leads to Credential Leakage

OpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.

cve-2026-32913 credential-access header-injection openclaw
2r 1t