2026.3.13
1 months ago
1 days ago
Known vulnerabilities in the openclaw package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Permissive Regular Expression via the How to fix Permissive Regular Expression? Upgrade | <2026.3.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File in the pairing setup. An attacker can gain unauthorized access to long-lived shared gateway credentials by obtaining a leaked setup code from chat history, logs, screenshots, or copied QR payloads. How to fix Insertion of Sensitive Information into Log File? Upgrade | <2026.3.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Unsafe Dependency Resolution via the automatic plugin discovery in How to fix Unsafe Dependency Resolution? Upgrade | <2026.3.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via insufficient access control in the command handler. An attacker can gain unauthorized access to privileged configuration and debugging interfaces by sending commands as a non-owner user. How to fix Incorrect Authorization? Upgrade | <2026.3.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.3.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature via the webhook event validation. An attacker can inject forged events and impersonate legitimate senders by submitting crafted requests to the webhook endpoint. This may result in unauthorized actions being triggered in downstream systems. How to fix Improper Verification of Cryptographic Signature? Upgrade | <2026.3.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization via the WebSocket connection. An attacker can gain unauthorized access to elevated gateway operations by presenting client-declared scopes that are not properly bound to a device identity or trusted path. How to fix Missing Authorization? Upgrade | <2026.3.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the Discord reaction ingestion for guild channels. An attacker can gain unauthorized access to restricted session events by sending reaction events from a non-allowlisted guild member. How to fix Incorrect Authorization? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition through the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key through improper authorization in the How to fix Authorization Bypass Through User-Controlled Key? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization through the How to fix Missing Authorization? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition through the handling of temporary file creation and population in the sandboxed file system bridge. An attacker can write arbitrary data outside the intended validated directory by exploiting a race condition in parent-path aliasing before the final guarded replace step. How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization through the How to fix Incorrect Authorization? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization through the How to fix Incorrect Authorization? Upgrade | <2026.3.11-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Not Failing Securely ('Failing Open') in the credential resolution process. An attacker can access unintended remote credentials by configuring local authentication SecretRefs that are unavailable, causing the system to fall back to remote credential sources instead of failing as expected. How to fix Not Failing Securely ('Failing Open')? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Origin Validation Error in the WebSocket connections when How to fix Origin Validation Error? Upgrade | <2026.3.11 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack through improper handling of symlink alias resolution during workspace boundary checks. An attacker can gain unauthorized write access to files outside the intended workspace or sandbox by exploiting dangling symlinks that resolve beyond the configured boundary. How to fix Symlink Attack? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authentication Bypass by Alternate Name in the Microsoft Teams group sender authorization process when a route allowlist is configured and the sender allowlist is empty. An attacker can gain unauthorized access to trigger replies in allowlisted Teams routes by exploiting the wildcard sender authorization logic. How to fix Authentication Bypass by Alternate Name? Upgrade | <2026.3.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the group allowlist authorization. An attacker can gain unauthorized group sender access by leveraging DM pairing-store entries to satisfy group allowlist checks. How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition through the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition through the skills download installer. An attacker can cause files to be written outside the intended directory by rebinding the validated base path between its validation and use. How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the handling of Slack system events in How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the workspace path validation. An attacker can gain unauthorized access to files and potentially modify or create files outside the intended workspace boundary by exploiting symlinks that point to non-existent targets outside the workspace. How to fix Symlink Attack? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel in the How to fix Authentication Bypass Using an Alternate Path or Channel? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Protection Mechanism Failure via the How to fix Protection Mechanism Failure? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Use of GET Request Method With Sensitive Query Strings via the process that appends authentication material to the browser URL query string and persists it in browser How to fix Use of GET Request Method With Sensitive Query Strings? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the How to fix Authorization Bypass Through User-Controlled Key? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Control of Interaction Frequency via the How to fix Improper Control of Interaction Frequency? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficiently Protected Credentials via the How to fix Insufficiently Protected Credentials? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.7-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack in the How to fix Symlink Attack? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Reliance on IP Address for Authentication in the How to fix Reliance on IP Address for Authentication? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the processing of Slack interactive callbacks, specifically How to fix Incorrect Authorization? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key in the How to fix Authorization Bypass Through User-Controlled Key? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties via the How to fix Files or Directories Accessible to External Parties? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) incomplete validation of IPv4 special-use address ranges in the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the How to fix Symlink Attack? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization through improper access control in the pairing store process. An attacker can gain unauthorized access to another account's direct message pairing by leveraging approval from a different account in multi-account deployments. How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the URL ingestion process. An attacker can access internal or private network resources by crafting a URL containing an ISATAP IPv6 literal that embeds a private IPv4 address, thereby bypassing hostname/IP filtering in URL-fetching paths. How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authentication for Critical Function in the How to fix Missing Authentication for Critical Function? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the webhook request body parsing. An attacker can degrade service availability by sending slow or oversized unauthenticated requests that hold the parser open before authentication and signature checks are performed. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.3.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Unsafe Dependency Resolution via the How to fix Unsafe Dependency Resolution? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Certificate Validation via Note: This is only exploitable if remote iMessage deployments are configured to use SCP for attachment retrieval. How to fix Improper Certificate Validation? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the How to fix Symlink Attack? Upgrade | <2026.3.2-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization incomplete access checks in authenticated DM sessions for owner-only gateway tools. An attacker can perform unauthorized gateway actions by invoking specific tool paths as an authenticated non-owner in a DM session. This is only exploitable if the attacker is authenticated and initiates a direct message session with the target. How to fix Incorrect Authorization? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Encoding or Escaping of Output via the script generation process in Windows deployments due to improper handling of command-line arguments in How to fix Improper Encoding or Escaping of Output? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the Note: This is only exploitable if the deployment is in a shared-user or shared-host environment where an untrusted local user or process can bind to the loopback relay port. How to fix Missing Authentication for Critical Function? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Reliance on Untrusted Inputs in a Security Decision when trusted-proxy authentication is enabled. An attacker can gain unauthorized access to node event methods by connecting with a How to fix Reliance on Untrusted Inputs in a Security Decision? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficiently Protected Credentials due to the reuse of authentication tokens as a fallback secret in the owner ID prompt hashing process. An attacker can infer sensitive hash outputs by observing prompt metadata, especially if weak gateway tokens are used and the dedicated secret is unset. How to fix Insufficiently Protected Credentials? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties via the How to fix Files or Directories Accessible to External Parties? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection in the How to fix Command Injection? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key in the How to fix Authorization Bypass Through User-Controlled Key? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the SSRF IP classification. An attacker can access unintended network resources by supplying IPv6 multicast addresses that bypass address classification checks. How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Cleartext Transmission of Sensitive Information via the Note: This is only exploitable if the insecure configuration is enabled and the gateway is accessible over plaintext HTTP. How to fix Cleartext Transmission of Sensitive Information? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the Telegram DM message handling. An attacker can cause unauthorized media files to be downloaded and written to disk by sending inbound media messages before sender authorization checks are completed. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the WebSocket connect process. An attacker can inject unauthorized How to fix Incorrect Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via Note: This is only exploitable if iMessage attachments are enabled, remote attachment mode is active, and the attacker can manipulate attachment path metadata. How to fix Directory Traversal? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the How to fix Symlink Attack? Upgrade | <2026.2.25-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.17 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Race Condition in the How to fix Race Condition? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via How to fix Incorrect Authorization? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal in Note: This is only exploitable if sandbox mode is enabled, How to fix Directory Traversal? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization through a mismatch in wrapper-depth parsing in How to fix Incorrect Authorization? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs via Note: This is only exploitable if How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Untrusted Search Path through the How to fix Untrusted Search Path? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Untrusted Search Path via How to fix Untrusted Search Path? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to External Control of System or Configuration Setting via the How to fix External Control of System or Configuration Setting? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via Note: This is only exploitable if the deployment is configured with How to fix Incorrect Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization via How to fix Missing Authorization? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via Note: This is only exploitable if an attacker can control image entries in session data, such as through crafted tool results or session manipulation. How to fix Cross-site Scripting (XSS)? Upgrade | <2026.2.23 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Reliance on Untrusted Inputs in a Security Decision via improper parsing of the How to fix Reliance on Untrusted Inputs in a Security Decision? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource due to the browser container launching Chromium with the How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the How to fix Symlink Attack? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the ZIP extraction process when a pre-existing symlink exists in the destination path. An attacker can write files outside the intended extraction directory by crafting a ZIP archive and leveraging symlink traversal. How to fix Symlink Attack? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Origin Validation Error via the WebSocket authentication process. An attacker can gain unauthorized access to operator-level WebSocket sessions and invoke privileged control-plane methods by tricking a user into opening a malicious web page and successfully brute-forcing the gateway password. This is only exploitable if the gateway is reachable on loopback, password authentication mode is enabled, the victim opens attacker-controlled web content, and the password is guessable within feasible brute-force or dictionary attempts. How to fix Origin Validation Error? Upgrade | <2026.2.25-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Execution with Unnecessary Privileges due to the absence of a USER directive in the Dockerfiles, causing all processes to run as root. An attacker can gain root privileges within the container by compromising any process running inside these containers, which may enable kernel exploit attempts, abuse of mounted volumes, and access to privileged syscalls. How to fix Execution with Unnecessary Privileges? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authentication for Critical Function in the How to fix Missing Authentication for Critical Function? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Behavior Order: Validate Before Canonicalize via the boundary validation process for How to fix Incorrect Behavior Order: Validate Before Canonicalize? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via inconsistent enforcement of host and DNS policies in the media fetch process. An attacker can access internal network resources or unintended hosts by exploiting fetch paths that bypass shared guard logic. How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs via the How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Restriction of Rendered UI Layers or Frames in the How to fix Improper Restriction of Rendered UI Layers or Frames? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via improper validation of media local-paths in the sandbox. An attacker can access and exfiltrate files outside the intended sandbox boundary by supplying absolute paths under the host temporary directory that are not confined to the active sandbox root. How to fix Directory Traversal? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Interpretation Conflict through a mismatch in policy and runtime interpretation of wrapper commands using GNU How to fix Interpretation Conflict? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) in the How to fix Improper Handling of Highly Compressed Data (Data Amplification)? Upgrade | <2026.3.2-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? Upgrade | >=2026.2.13 <2026.3.2-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.25-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.3.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via improper validation of file paths in browser output handling. An attacker can write files outside of intended directory boundaries by exploiting insufficient path confinement checks. How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.2-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel via the route classification process. An attacker can gain unauthorized access to protected API endpoints by submitting requests with deeply encoded alternate path representations that bypass authentication checks. How to fix Authentication Bypass Using an Alternate Path or Channel? Upgrade | <2026.3.2-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Replay Attack via the How to fix Replay Attack? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via the ZIP extraction process. An attacker can cause files to be written outside the intended extraction directory by exploiting a race condition involving a parent-directory symlink rebind between path validation and file write. How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.2-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Prototype Pollution via the How to fix Prototype Pollution? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Arbitrary Command Injection via the How to fix Arbitrary Command Injection? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the Note: This is only exploitable if the target uses the macOS node-host execution path, exec approvals are set to allowlist mode, ask mode is set to on-miss or off, and the allowlist contains a benign executable used in a shell wrapper flow. How to fix Command Injection? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Replay Attack via the webhook replay handling. An attacker can cause duplicate inbound actions to be processed by replaying previously valid signed webhook requests after the replay window expires or following a process restart. How to fix Replay Attack? Upgrade | <2026.2.25-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to User Impersonation during authentication. An attacker can gain unauthorized access to HTTP gateway routes by exploiting the improper application of tokenless Tailscale authentication headers, bypassing token or password requirements in trusted-network deployments. Note: This is only exploitable if tokenless Tailscale authentication is enabled and the deployment relies on token/password authentication for HTTP gateway routes. How to fix User Impersonation? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Arbitrary Code Injection via the transform module path resolution process. An attacker can execute arbitrary JavaScript code with gateway-process privileges by causing a symlinked entry to resolve outside the trusted directory and be dynamically imported. This is only exploitable if hook transforms are enabled and reachable, the attacker can influence transform path resolution (such as via privileged config access or writable filesystem path in the transform tree), and a symlink escape exists to attacker-controlled code. How to fix Arbitrary Code Injection? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Privilege Assignment via the How to fix Incorrect Privilege Assignment? Upgrade | <2026.3.2-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs via the How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Untrusted Search Path via the How to fix Untrusted Search Path? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the How to fix Symlink Attack? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.2.23 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the static file serving API. An attacker can access files outside the intended directory by placing symbolic links within the root directory and requesting those linked paths. How to fix Directory Traversal? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Authorization in the Note: This is only exploitable if the caller is authenticated with How to fix Improper Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack in the handling of browser trace and download output paths, specifically when processing temporary output. An attacker can overwrite arbitrary files by exploiting symlink traversal in the output path configuration. How to fix Symlink Attack? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the bypass of the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Protection Mechanism Failure through improper validation of the How to fix Protection Mechanism Failure? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition in the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through improper handling of client IP address normalization in the authentication rate-limiting process. An attacker can increase the number of allowed failed authentication attempts by alternating between IPv4 and IPv4-mapped IPv6 address formats, effectively bypassing intended rate limits. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the avatar handling. An attacker can access sensitive local files outside the intended workspace by submitting crafted symlink paths to the avatar interface. How to fix Symlink Attack? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the exec approval mode on macOS node-hosts when basename-only allowlist entries are configured. An attacker can execute unauthorized local binaries by creating a file with the same name as an allowed command, thereby bypassing intended path-based policy enforcement. How to fix Incorrect Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Off-by-one Error in the How to fix Off-by-one Error? Upgrade | <2026.2.23 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the paired node device reconnect. An attacker can gain unauthorized access to restricted commands by spoofing the How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data via the OAuth onboarding process in the macOS beta application, where the PKCE How to fix Insertion of Sensitive Information Into Sent Data? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Access Control Bypass in the How to fix Access Control Bypass? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the stop triggers and How to fix Incorrect Authorization? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the Zalo webhook. An attacker can exhaust system memory and cause process instability or termination by sending unauthenticated requests with varying query-string keys to the webhook endpoint. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization through an authorization mismatch in the agent. An attacker can perform privileged control-plane actions beyond their intended write scope by invoking owner-only tool surfaces such as How to fix Missing Authorization? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the archive extraction process. An attacker can write arbitrary files outside the intended extraction directory by supplying a crafted archive during explicit installation commands. This can lead to persistence or code execution if a user is convinced to install a malicious archive. How to fix Directory Traversal? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the group allowlist authorization. An attacker can gain unauthorized access to group communications by leveraging DM pairing-store approvals to bypass explicit group allowlist checks. How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the approval-enabled How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the media-stream WebSocket upgrades. An attacker can exhaust server resources by establishing multiple unauthenticated pre-start socket connections and keeping them open without validation. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in handling inbound media downloads across multiple channels, where configured byte limits are not consistently enforced before buffering remote media. An attacker can cause elevated memory usage and potential process instability by sending oversized media payloads. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.2.22 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via the media attachment handling. An attacker can access files outside the intended sandbox boundary by exploiting a race condition between path validation and file read operations, such as by retargeting a symlink between the check and use steps. How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Interpretation Conflict via the How to fix Interpretation Conflict? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Multiple Releases of Same Resource or Handle via the How to fix Multiple Releases of Same Resource or Handle? Upgrade | <2026.2.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs in the Note:
This is exploitable only if all of these conditions are present: How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.2.23 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to User Impersonation via the moderation action handling process. An attacker can perform unauthorized moderation actions by spoofing sender identity fields in tool-driven flows. Note: This is only exploitable if Discord moderation actions are enabled and the bot has the necessary guild permissions. How to fix User Impersonation? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to missing prompt-size checks in the ACP local stdio bridge. An attacker can cause reduced responsiveness and increased resource usage by submitting excessively large prompt inputs through local ACP clients (for example, IDE integrations). How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following via the How to fix UNIX Symbolic Link (Symlink) Following? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Information Exposure via the How to fix Information Exposure? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs in the How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.2.19 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the Note: This is only exploitable if How to fix Directory Traversal? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Use of Weak Hash due to the use of SHA-1 in the process that generates sandbox identifier cache keys for Docker or browser sandbox configuration. An attacker can cause one configuration to be interpreted as another by exploiting hash collisions, potentially leading to cache poisoning and unsafe sandbox state reuse. How to fix Use of Weak Hash? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Unverified Ownership via the process cleanup routine. An attacker can cause termination of unrelated system processes by exploiting pattern-based process enumeration without ownership validation. How to fix Unverified Ownership? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the manual OAuth login flow. An attacker can cause credential substitution by convincing a user to paste attacker-controlled OAuth callback data, allowing the attacker to exchange an authorization code and persist tokens for an unintended account. How to fix Cross-site Request Forgery (CSRF)? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authentication for Critical Function due to missing authentication when starting sandbox browser bridge server. An attacker can gain unauthorized access to browser control endpoints, enumerate open tabs, retrieve WebSocket URLs, execute JavaScript in page contexts, and exfiltrate session data by sending requests from a local process to the exposed server port. How to fix Missing Authentication for Critical Function? Upgrade | >=2026.1.29-beta.1 <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the rendering process of assistant identity values into an inline How to fix Cross-site Scripting (XSS)? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Comparison Logic Granularity due to the How to fix Incorrect Comparison Logic Granularity? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficiently Protected Credentials via the logging process. An attacker can gain unauthorized access to sensitive credentials by reviewing logs, crash reports, CI output, or support bundles that contain unredacted tokens. How to fix Insufficiently Protected Credentials? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to External Control of File Name or Path via improper validation of the How to fix External Control of File Name or Path? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Origin Validation Error in the Note: This is only exploitable if the deployment is configured as a shared agent in a multi-user, less-trusted environment. How to fix Origin Validation Error? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Arbitrary Command Injection due to embedding the current working directory path into LLM prompts without sanitization. An attacker can manipulate agent behavior or cause disclosure of sensitive information by placing the application in a directory with specially crafted control or format characters in its name. How to fix Arbitrary Command Injection? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Execution with Unnecessary Privileges via the How to fix Execution with Unnecessary Privileges? Upgrade | <2026.2.15 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the keychain credential refresh path. An attacker can execute arbitrary OS commands by supplying crafted OAuth tokens that are incorporated into shell command arguments. How to fix Command Injection? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the Note: This is only exploitable if the attacker has administrative control over the Google Workspace or identity provider to reassign an email address to a different underlying account. How to fix Incorrect Authorization? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Authorization via the Note: This is only exploitable if Slack DMs are enabled with the configuration How to fix Improper Authorization? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to User Impersonation in the Telegram allowlist authorization. An attacker can gain unauthorized access by registering or taking over a previously authorized How to fix User Impersonation? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via How to fix Incorrect Authorization? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficiently Protected Credentials via the How to fix Insufficiently Protected Credentials? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the mutation endpoints exposed on loopback addresses without proper Origin or Referer validation. An attacker can cause unauthorized state changes, such as opening tabs, starting or stopping the browser, or mutating storage and cookies, by enticing a victim to visit a malicious website that triggers cross-origin requests to the local browser control service. Note: This is only exploitable if the browser control service is reachable on loopback in the victim's browser context and authentication is not enabled. How to fix Cross-site Request Forgery (CSRF)? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via How to fix Incorrect Authorization? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Certificate Validation via unauthenticated TXT records in the discovery routing. An attacker can redirect client connections to attacker-controlled endpoints and potentially intercept sensitive credentials by advertising a rogue service on a shared or untrusted LAN. How to fix Improper Certificate Validation? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the Note: This is only exploitable if the script is executed in a source checkout containing a crafted commit author email. Normal CLI usage is not affected. How to fix Command Injection? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the handling of module paths in the gateway configuration. An attacker can execute arbitrary code by supplying a crafted module path to the configuration if they have high-privilege access to modify gateway settings. How to fix Directory Traversal? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the base64 media decoding. An attacker can exhaust system memory resources by submitting oversized base64-encoded payloads, leading to application unavailability. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Reliance on Untrusted Inputs in a Security Decision via unsafe handling of the How to fix Reliance on Untrusted Inputs in a Security Decision? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the SSRF guard. An attacker can access internal network resources by submitting specially crafted IPv4-mapped IPv6 addresses that bypass IP classification checks. How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.2.14 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.2.14 |