2026.3.2
1 months ago
16 hours ago
Known vulnerabilities in the openclaw package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack via the How to fix Symlink Attack? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.2.23 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Symlink Attack in the handling of browser trace and download output paths, specifically when processing temporary output. An attacker can overwrite arbitrary files by exploiting symlink traversal in the output path configuration. How to fix Symlink Attack? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Protection Mechanism Failure through improper validation of the How to fix Protection Mechanism Failure? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition in the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.2.24 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Off-by-one Error in the How to fix Off-by-one Error? Upgrade | <2026.2.23 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the paired node device reconnect. An attacker can gain unauthorized access to restricted commands by spoofing the How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data via the OAuth onboarding process in the macOS beta application, where the PKCE How to fix Insertion of Sensitive Information Into Sent Data? Upgrade | <2026.2.25 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Access Control Bypass in the How to fix Access Control Bypass? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the stop triggers and How to fix Incorrect Authorization? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the Zalo webhook. An attacker can exhaust system memory and cause process instability or termination by sending unauthenticated requests with varying query-string keys to the webhook endpoint. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization through an authorization mismatch in the agent. An attacker can perform privileged control-plane actions beyond their intended write scope by invoking owner-only tool surfaces such as How to fix Missing Authorization? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the group allowlist authorization. An attacker can gain unauthorized access to group communications by leveraging DM pairing-store approvals to bypass explicit group allowlist checks. How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the approval-enabled How to fix Incorrect Authorization? Upgrade | <2026.2.26 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via the media attachment handling. An attacker can access files outside the intended sandbox boundary by exploiting a race condition between path validation and file read operations, such as by retargeting a symlink between the check and use steps. How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Interpretation Conflict via the How to fix Interpretation Conflict? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.23-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs in the Note:
This is exploitable only if all of these conditions are present: How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.2.23 |