📦 Openclaw

by Openclaw

🔍 What is Openclaw?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2026-27002

CRITICAL CVSS 9.8 Feb 20, 2026

OpenClaw's Docker sandbox configuration injection vulnerability allows attackers to escape container isolation and access the host system. This affects OpenClaw personal AI assistant deployments using...

CVE-2026-27487

HIGH CVSS 7.6 Feb 21, 2026

OpenClaw versions 2026.2.13 and below on macOS are vulnerable to OS command injection when refreshing OAuth tokens in the Keychain. This allows attackers to execute arbitrary commands with the user's ...

CVE-2026-26324

HIGH CVSS 7.5 Feb 19, 2026

OpenClaw's SSRF protection could be bypassed using IPv4-mapped IPv6 addresses, allowing attackers to access restricted internal resources like localhost or private networks. This affects all OpenClaw ...

CVE-2026-26321

HIGH CVSS 7.5 Feb 19, 2026

OpenClaw's Feishu extension had a path traversal vulnerability that allowed reading arbitrary local files by supplying attacker-controlled paths. This affects OpenClaw installations with the Feishu ex...

CVE-2026-26323

HIGH CVSS 8.8 Feb 19, 2026

OpenClaw versions 2026.1.8 through 2026.2.13 have a command injection vulnerability in a developer script that processes git commit metadata. When maintainers or CI systems run the affected script, ma...

CVE-2026-26319

HIGH CVSS 7.5 Feb 19, 2026

OpenClaw versions 2026.2.13 and below with the @openclaw/voice-call plugin allow unauthenticated attackers to forge Telnyx webhook events when telnyx.publicKey is not configured. This affects deployme...

CVE-2026-26316

HIGH CVSS 7.5 Feb 19, 2026

This vulnerability allows attackers to bypass authentication in OpenClaw's BlueBubbles iMessage plugin by sending webhook requests from localhost addresses without valid credentials. It affects OpenCl...

CVE-2026-25474

HIGH CVSS 7.5 Feb 19, 2026

OpenClaw versions 2026.1.30 and below have an authentication bypass vulnerability in Telegram webhook mode. When channels.telegram.webhookSecret is not configured, the system accepts webhook requests ...

CVE-2026-25593

HIGH CVSS 8.4 Feb 6, 2026

OpenClaw personal AI assistant versions before 2026.1.20 contain a command injection vulnerability. Unauthenticated local clients can exploit the Gateway WebSocket API to inject malicious commands tha...

CVE-2026-25157

HIGH CVSS 7.7 Feb 4, 2026

OpenClaw versions before 2026.1.29 contain two command injection vulnerabilities. Attackers can execute arbitrary commands on remote SSH hosts via unescaped project paths or on local machines via mali...

CVE-2026-24763

HIGH CVSS 8.8 Feb 2, 2026

OpenClaw (formerly Clawdbot) versions prior to 2026.1.29 contain a command injection vulnerability in the Docker sandbox execution mechanism. Authenticated users who can control environment variables ...

CVE-2026-25253

HIGH CVSS 8.8 Feb 1, 2026

OpenClaw (also known as clawdbot or Moltbot) versions before 2026.1.29 automatically establish WebSocket connections using gatewayUrl values from query strings without user consent, transmitting authe...

CVE-2026-27576

MEDIUM CVSS 4.0 Feb 21, 2026

OpenClaw's ACP bridge accepts excessively large prompt text blocks, allowing local ACP clients to send oversized payloads that could cause resource exhaustion or denial of service. This primarily affe...

CVE-2026-27485

MEDIUM CVSS 4.4 Feb 21, 2026

OpenClaw versions 2026.2.17 and below have a symlink vulnerability in the skill packaging script that allows local file inclusion when building .skill archives. This affects developers who package ski...

CVE-2026-27008

MEDIUM CVSS 6.7 Feb 20, 2026

OpenClaw versions before 2026.2.15 contain a path traversal vulnerability in the skill installation process. The bug allows malicious skill packages to write files outside the intended sandbox directo...

CVE-2026-27004

MEDIUM CVSS 5.5 Feb 20, 2026

OpenClaw session tools allowed broader session targeting than intended in shared-agent deployments, potentially exposing transcript content across peer sessions in multi-user environments. The vulnera...

CVE-2026-27009

MEDIUM CVSS 5.8 Feb 20, 2026

OpenClaw Control UI had a stored XSS vulnerability where attacker-controlled JavaScript could execute in the Control UI origin. This affected OpenClaw versions before 2026.2.15. Attackers could craft ...

CVE-2026-26972

MEDIUM CVSS 6.7 Feb 20, 2026

OpenClaw versions 2026.1.12 through 2026.2.12 contain a path traversal vulnerability in browser download helpers that allows authenticated attackers to write files outside the intended temporary downl...

CVE-2026-26329

MEDIUM CVSS 6.5 Feb 20, 2026

OpenClaw personal AI assistant versions before 2026.2.14 allow authenticated attackers to read arbitrary files from the Gateway host via path traversal in the browser tool's upload function. This affe...

CVE-2026-26326

MEDIUM CVSS 4.3 Feb 19, 2026

OpenClaw personal AI assistant versions before 2026.2.14 could expose sensitive configuration secrets to clients with read-only permissions. The vulnerability occurs when the system returns raw resolv...

CVE-2026-25475

MEDIUM CVSS 6.5 Feb 4, 2026

OpenClaw versions before 2026.1.30 contain a path traversal vulnerability in the isValidMedia() function that allows reading arbitrary files on the system. Any user or agent can exploit this by provid...