2026.5.2
3 months ago
12 hours ago
Known vulnerabilities in the openclaw package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization via the How to fix Missing Authorization? Upgrade | <2026.4.21 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the webchat audio embedding process. An attacker can access and exfiltrate arbitrary local audio-like files readable by the gateway process by influencing the How to fix Directory Traversal? Upgrade | <2026.4.15-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.4.20-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization via the policy enforcement process. An attacker can gain unauthorized access to restricted tools by leveraging bundled MCP or LSP tools that bypass configured tool policies. This is only exploitable if a bundled MCP or LSP tool source is configured and an operator policy is set to restrict that tool. How to fix Missing Authorization? Upgrade | <2026.4.19-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity via the How to fix Insufficient Verification of Data Authenticity? Upgrade | <2026.4.19-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Unsafe Dependency Resolution via the process that loads environment variables from workspace configuration. An attacker can execute arbitrary code with the privileges of the operator by supplying malicious environment variables such as How to fix Unsafe Dependency Resolution? Upgrade | <2026.4.20-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the How to fix Authorization Bypass Through User-Controlled Key? Upgrade | <2026.4.20-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization through the Feishu card-action callback process. An attacker can bypass intended policy restrictions by crafting a card-action event that misclassifies direct messages as group conversations, thereby avoiding enforcement of How to fix Incorrect Authorization? Upgrade | <2026.4.19-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the browser profile creation process. An attacker can cause unauthorized requests to internal network resources by storing a profile with a How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.4.19-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs in the environment variable loading process. An attacker can influence trusted runtime behavior by setting specially crafted How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.4.20-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficient Granularity of Access Control via insufficient access control in the How to fix Insufficient Granularity of Access Control? Upgrade | <2026.4.20-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Origin Validation Error via the Slack thread context. An attacker can inject unauthorized messages into the agent context by replying to allowlisted users in Slack threads, thereby bypassing sender access controls and manipulating the model's context. How to fix Origin Validation Error? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the paired-device pairing management process. An attacker can gain unauthorized access to approve or operate on unrelated pending device requests by leveraging paired-device access within the same gateway scope. How to fix Incorrect Authorization? Upgrade | <2026.4.20 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.4.20 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the Nostr DM ingress path. An attacker can cause unauthorized pairing challenges to be issued and consume shared pairing capacity by sending forged direct messages before event signature validation. How to fix Improper Verification of Cryptographic Signature? Upgrade | <2026.3.31 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Cleartext Transmission of Sensitive Information via the How to fix Cleartext Transmission of Sensitive Information? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Unsafe Dependency Resolution in the authentication setup. An attacker can cause untrusted workspace plugins to be auto-enabled by leveraging non-interactive onboarding that selects a provider authentication choice shadowed by an untrusted plugin. How to fix Unsafe Dependency Resolution? Upgrade | <2026.4.9-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | >=2026.2.23 <2026.4.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.4.5 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Removal of Sensitive Information Before Storage or Transfer in the Note: This is only exploitable if the attacker is an authenticated gateway client with configuration read access. How to fix Improper Removal of Sensitive Information Before Storage or Transfer? Upgrade | <2026.4.14-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via improper handling of environment variable assignments in argv forms during shell-wrapper detection. An attacker can execute arbitrary commands by injecting specially crafted environment variable assignments into the argument vector. How to fix Command Injection? Upgrade | >=2026.2.22 <2026.4.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs due to insufficient filtering of high-risk interpreter startup environment variables in the execution environment policy. An attacker can influence downstream execution or network behavior by supplying crafted environment variables. How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to DNS Rebinding via improper hostname validation in the browser navigation policy. An attacker can access internal network resources or sensitive endpoints by exploiting DNS rebinding techniques to bypass hostname restrictions. How to fix DNS Rebinding? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization in the channel setup. An attacker can gain unauthorized access to privileged plugin functionality by introducing untrusted workspace plugin shadows that are resolved before trusted bundled plugins. How to fix Missing Authorization? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via improper validation of the How to fix Incorrect Authorization? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization when handling collect-mode queue batches, where messages from different senders could be processed together using the authorization context of the final sender. An attacker can gain unauthorized access to actions or data by sending messages that are subsequently processed with elevated privileges inherited from another sender. How to fix Incorrect Authorization? Upgrade | <2026.4.14-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to External Control of System or Configuration Setting via the loading of workspace How to fix External Control of System or Configuration Setting? Upgrade | <2026.4.9-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization in the approval authorization. An attacker can gain unauthorized approval rights by exploiting empty approver lists, allowing them to resolve pending approvals if they know an approval id. How to fix Missing Authorization? Upgrade | <2026.4.12 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in the agent hook event processing. An attacker can escalate privileges by supplying crafted external input that is treated as trusted system events. How to fix Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Binding to an Unrestricted IP Address via the CDP relay. An attacker can gain unauthorized access to the Chrome DevTools Protocol by connecting from outside the intended local or sandboxed network range. How to fix Binding to an Unrestricted IP Address? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the sandbox noVNC helper route. An attacker can gain unauthorized access to interactive browser session credentials by bypassing bridge authentication. How to fix Missing Authentication for Critical Function? Upgrade | >=2026.2.21 <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization through the How to fix Incorrect Authorization? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the outbound media handling. An attacker can access arbitrary local files by referencing host-local paths outside the intended media storage boundary in reply text. How to fix Directory Traversal? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Use of a Key Past its Expiration Date due to the reuse of a previously resolved bearer authentication configuration in the How to fix Use of a Key Past its Expiration Date? Upgrade | <2026.4.15-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition via the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.4.10 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs via the environment variable handling process. An attacker can influence Git operations by setting specific environment variables before execution. How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Access Control Bypass due to missing owner-only enforcement in the How to fix Access Control Bypass? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity via the How to fix Insufficient Verification of Data Authenticity? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource via the How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficient Session Expiration due to the How to fix Insufficient Session Expiration? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Support for Integrity Check through the How to fix Missing Support for Integrity Check? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Command Injection via the How to fix Command Injection? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficient Session Expiration due to the failure to terminate existing WebSocket sessions upon shared gateway token rotation. An attacker can maintain unauthorized access to an active session by continuing to use a previously valid shared token after it has been rotated. How to fix Insufficient Session Expiration? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Exposure of Resource to Wrong Sphere in the handling of shared reply MEDIA references, where paths are treated as trusted. An attacker can cause unauthorized access to local files by crafting a shared reply MEDIA reference that triggers another channel to read a local file path as trusted generated media. How to fix Exposure of Resource to Wrong Sphere? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to missing pre-allocation size checks in the base64 decoding process. An attacker can cause excessive memory allocation by providing specially crafted input data. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Trust Boundary Violation via the How to fix Trust Boundary Violation? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Trust Boundary Violation via the process handling background runtime output injection into trusted How to fix Trust Boundary Violation? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the media download process. An attacker can access internal network resources by sending crafted requests to the affected media fetch endpoints. How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Privilege Management in the Gateway plugin HTTP. An attacker can gain unauthorized write access by sending requests that are only intended to have read privileges, resulting in privilege escalation. How to fix Improper Privilege Management? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs via the handling of environment variables in the exec env denylist. An attacker can execute arbitrary commands by injecting malicious values into environment variables such as How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Input Validation in to the How to fix Improper Input Validation? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through concurrent asynchronous authentication attempts. An attacker can exhaust system resources by racing the per-key rate-limit budget, potentially leading to degraded service availability. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.4.5 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via improper handling of redirects in the Playwright navigation. An attacker can access internal or private network resources by crafting requests that exploit insufficient validation of redirect targets. How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel in the Pairing Reconnect Command. An attacker can gain unauthorized access to privileged commands by reconnecting a previously paired node, thereby bypassing the intended operator or admin re-pairing requirement. How to fix Authentication Bypass Using an Alternate Path or Channel? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the Interaction-Triggered Navigation. An attacker can access internal resources by triggering browser interactions that bypass normal navigation checks. How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Privilege Management via the How to fix Improper Privilege Management? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Open Redirect via the How to fix Open Redirect? Upgrade | <2026.4.8 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Arbitrary File Upload through the Tlon media downloads process. An attacker can exhaust disk resources by bypassing core size, count, and cleanup limits. How to fix Arbitrary File Upload? Upgrade | <2026.3.31 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the enforcement of pending pairing-request caps per channel rather than per account. An attacker can prevent new pairing or onboarding actions for other accounts by filling the shared pending window with requests from different accounts. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | >=2026.2.26 <2026.3.31 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.3.31 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Timing Attack through the How to fix Timing Attack? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Privilege Management in the How to fix Improper Privilege Management? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Unsafe Dependency Resolution through the channel setup process. An attacker can execute arbitrary code by introducing a malicious workspace plugin that claims a bundled channel id, allowing code execution during channel setup even if the plugin remains disabled and untrusted. How to fix Unsafe Dependency Resolution? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.3.31 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the QQ Bot media-send path. An attacker can access arbitrary files on the host filesystem by crafting structured payloads that specify file paths outside of intended media roots. How to fix Directory Traversal? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Handling of Case Sensitivity due to inconsistent normalization of environment override keys between approval binding and execution time. An attacker can inject unauthorized environment variables into approved commands by exploiting this discrepancy. How to fix Improper Handling of Case Sensitivity? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Information Exposure via the How to fix Information Exposure? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization through the approval process for local scripts in How to fix Incorrect Authorization? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Input Validation via the CDP discovery process. An attacker can redirect authenticated browser control to a localhost-resolving endpoint by crafting a discovery response with a trailing-dot localhost host, thereby bypassing loopback-host normalization and potentially exposing sensitive browser state. How to fix Improper Input Validation? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs via the Note: This is only exploitable if exec allowlist or allow-always behavior is enabled and the attacker can influence the shell-wrapper command to use init-file options. How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.3.31 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs through the How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following in the How to fix UNIX Symbolic Link (Symlink) Following? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Removal of Sensitive Information Before Storage or Transfer via the How to fix Improper Removal of Sensitive Information Before Storage or Transfer? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions due to the How to fix Improper Check for Unusual or Exceptional Conditions? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the process that fetches quoted, root, or thread context messages, which bypasses the sender allowlist. An attacker can access message content from unauthorized senders by exploiting the lack of proper sender validation in this process. How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Replay Attack in the How to fix Replay Attack? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the How to fix Reliance on Untrusted Inputs in a Security Decision? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to External Control of System or Configuration Setting via the handling of the How to fix External Control of System or Configuration Setting? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the process that fetches thread root and reply context, which bypasses the sender allowlist. An attacker can gain unauthorized access to message threads by exploiting this bypass. How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Information Exposure in the How to fix Information Exposure? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Replay Attack in the replay deduplication process. An attacker can bypass intended access restrictions by reusing How to fix Replay Attack? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization via unauthenticated How to fix Missing Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Interpretation Conflict in the startup migration process. An attacker can restore previously revoked configuration settings by leveraging the improper handling of empty-array values in the file configuration after a restart. How to fix Interpretation Conflict? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs due to insufficient sanitization of environment variables related to package management, registries, Docker, compilers, and TLS overrides in the How to fix Incomplete List of Disallowed Inputs? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Use of Less Trusted Source in the How to fix Use of Less Trusted Source? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to External Control of System or Configuration Setting via the handling of the How to fix External Control of System or Configuration Setting? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Arbitrary File Upload via the How to fix Arbitrary File Upload? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficiently Protected Credentials via the media download process. An attacker can obtain sensitive credentials by triggering cross-origin redirects that cause Authorization headers to be forwarded to unintended destinations. How to fix Insufficiently Protected Credentials? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Improper Privilege Management in the handling of environment variable overrides for proxy, TLS, Docker, and Git TLS controls. An attacker can bypass intended security restrictions by executing processes in a host environment where these variables are not properly enforced. How to fix Improper Privilege Management? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) in the HTTP operator endpoints when running in trusted-proxy mode, as browser-origin validation is not enforced. An attacker can perform unauthorized actions on behalf of authenticated users by tricking them into visiting a malicious website that issues crafted requests to the affected endpoints. This is only exploitable if the deployment uses identity-bearing trusted-proxy browser configurations rather than the shared-secret HTTP operator model. How to fix Cross-site Request Forgery (CSRF)? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Replay Attack via the webhook signature verification process. An attacker can bypass replay detection by submitting requests with equivalent Base64 and Base64URL-encoded signatures, causing the system to treat them as distinct and allowing replayed requests to be accepted. How to fix Replay Attack? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties via the How to fix Files or Directories Accessible to External Parties? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Denial of Service (DoS) via the How to fix Denial of Service (DoS)? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the node pairing process. An attacker can execute arbitrary commands on the host system by exploiting insufficient enforcement of node scope restrictions. This is only exploitable if a device-paired node is present without proper node pairing. How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Uncontrolled Search Path Element via environment variable overrides of compiler binaries during approved host execution requests. An attacker can execute arbitrary code by substituting trusted compiler binaries with malicious ones. This is only exploitable if the attacker has access to submit an approved host-exec request within the existing exec trust domain. How to fix Uncontrolled Search Path Element? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the authentication process when using trusted-proxy authentication mode. An attacker can gain elevated privileges by exploiting incomplete scope-clearing, allowing self-declared operator scopes to persist on a real identity-bearing authentication path. How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the Discord voice ingress process. An attacker can gain unauthorized access to voice channels by bypassing the channel-level member access allowlist. How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource due to improper migration of How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the Discord slash and autocomplete command handling process. An attacker can gain unauthorized access to group DM channels by bypassing the allowlist restriction using native Discord slash or autocomplete commands. This is only exploitable if the attacker is an already-authorized Discord user. How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Brute Force in the authentication process. An attacker can bypass rate limiting by supplying a fake How to fix Brute Force? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficient Session Expiration due to the How to fix Insufficient Session Expiration? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Always-Incorrect Control Flow Implementation via the onboarding process. An attacker can obtain gateway credentials by leveraging a scenario where a previously discovered endpoint persists after trust is declined, and the operator accepts the prefilled endpoint during manual onboarding. How to fix Always-Incorrect Control Flow Implementation? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition in the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to DNS Rebinding in the macOS wide-area discovery process. An attacker can intercept or manipulate DNS responses and exfiltrate operator credentials by presenting themselves as a trusted Tailnet peer within the same Tailnet and leveraging a CA-trusted endpoint. This is only exploitable if the attacker is on the same Tailnet, has a CA-trusted endpoint, and the user selects the malicious peer. How to fix DNS Rebinding? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition in the How to fix Time-of-check Time-of-use (TOCTOU) Race Condition? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Incorrect Authorization in the process that handles Discord component interactions, which incorrectly classifies Group Direct Messages as standard Direct Messages. An attacker can cause policy or session misclassification by sending crafted component interactions in a Group DM context. How to fix Incorrect Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Missing Authorization in the Discord voice ingress authorization process. An attacker can gain unauthorized access to restricted voice channels by exploiting gaps in channel, name, and stale-role validation. How to fix Missing Authorization? Upgrade | <2026.3.31-beta.1 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity via the OAuth flow, where the PKCE verifier is reused as the OAuth How to fix Insufficient Verification of Data Authenticity? Upgrade | <2026.4.2 |
openclaw is a 🦞 OpenClaw — Personal AI Assistant Affected versions of this package are vulnerable to Arbitrary Code Injection via the upstream API requests. An attacker can execute arbitrary code by injecting malicious prompts into requests. How to fix Arbitrary Code Injection? There is no fixed version for | >=0.0.0 |