Openclaw Security Vulnerabilities (CVEs)

Track 21 security vulnerabilities affecting Openclaw products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

1 Critical
11 High
9 Medium
🔔 Get Alerts for Openclaw
CVE-2026-27487 7.6

OpenClaw versions 2026.2.13 and below on macOS are vulnerable to OS command injection when refreshing OAuth tokens in the Keychain. This allows attack...

Feb 21, 2026
CVE-2026-27576 4.0

OpenClaw's ACP bridge accepts excessively large prompt text blocks, allowing local ACP clients to send oversized payloads that could cause resource ex...

Feb 21, 2026
CVE-2026-27485 4.4

OpenClaw versions 2026.2.17 and below have a symlink vulnerability in the skill packaging script that allows local file inclusion when building .skill...

Feb 21, 2026
CVE-2026-27009 5.8

OpenClaw Control UI had a stored XSS vulnerability where attacker-controlled JavaScript could execute in the Control UI origin. This affected OpenClaw...

Feb 20, 2026
CVE-2026-27004 5.5

OpenClaw session tools allowed broader session targeting than intended in shared-agent deployments, potentially exposing transcript content across pee...

Feb 20, 2026
CVE-2026-27008 6.7

OpenClaw versions before 2026.2.15 contain a path traversal vulnerability in the skill installation process. The bug allows malicious skill packages t...

Feb 20, 2026
CVE-2026-27002 9.8

OpenClaw's Docker sandbox configuration injection vulnerability allows attackers to escape container isolation and access the host system. This affect...

Feb 20, 2026
CVE-2026-26972 6.7

OpenClaw versions 2026.1.12 through 2026.2.12 contain a path traversal vulnerability in browser download helpers that allows authenticated attackers t...

Feb 20, 2026
CVE-2026-26329 6.5

OpenClaw personal AI assistant versions before 2026.2.14 allow authenticated attackers to read arbitrary files from the Gateway host via path traversa...

Feb 20, 2026
CVE-2026-26321 7.5

OpenClaw's Feishu extension had a path traversal vulnerability that allowed reading arbitrary local files by supplying attacker-controlled paths. This...

Feb 19, 2026
CVE-2026-26323 8.8

OpenClaw versions 2026.1.8 through 2026.2.13 have a command injection vulnerability in a developer script that processes git commit metadata. When mai...

Feb 19, 2026
CVE-2026-26326 4.3

OpenClaw personal AI assistant versions before 2026.2.14 could expose sensitive configuration secrets to clients with read-only permissions. The vulne...

Feb 19, 2026
CVE-2026-26324 7.5

OpenClaw's SSRF protection could be bypassed using IPv4-mapped IPv6 addresses, allowing attackers to access restricted internal resources like localho...

Feb 19, 2026
CVE-2026-26319 7.5

OpenClaw versions 2026.2.13 and below with the @openclaw/voice-call plugin allow unauthenticated attackers to forge Telnyx webhook events when telnyx....

Feb 19, 2026
CVE-2026-26316 7.5

This vulnerability allows attackers to bypass authentication in OpenClaw's BlueBubbles iMessage plugin by sending webhook requests from localhost addr...

Feb 19, 2026
CVE-2026-25474 7.5

OpenClaw versions 2026.1.30 and below have an authentication bypass vulnerability in Telegram webhook mode. When channels.telegram.webhookSecret is no...

Feb 19, 2026
CVE-2026-25593 8.4

OpenClaw personal AI assistant versions before 2026.1.20 contain a command injection vulnerability. Unauthenticated local clients can exploit the Gate...

Feb 6, 2026
CVE-2026-25475 6.5

OpenClaw versions before 2026.1.30 contain a path traversal vulnerability in the isValidMedia() function that allows reading arbitrary files on the sy...

Feb 4, 2026
CVE-2026-25157 7.7

OpenClaw versions before 2026.1.29 contain two command injection vulnerabilities. Attackers can execute arbitrary commands on remote SSH hosts via une...

Feb 4, 2026
CVE-2026-24763 8.8

OpenClaw (formerly Clawdbot) versions prior to 2026.1.29 contain a command injection vulnerability in the Docker sandbox execution mechanism. Authenti...

Feb 2, 2026
CVE-2026-25253 8.8

OpenClaw (also known as clawdbot or Moltbot) versions before 2026.1.29 automatically establish WebSocket connections using gatewayUrl values from quer...

Feb 1, 2026

Why Monitor Openclaw Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 21+ known vulnerabilities affecting Openclaw products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Openclaw packages in under 60 seconds. No agents required - completely agentless scanning that works across Openclaw deployments.

Free vulnerability database: Access detailed information about every Openclaw CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Openclaw CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Openclaw CVEs Free