VYPR

npm package

clawdbot

pkg:npm/clawdbot

Vulnerabilities (10)

  • CVE-2026-29612Mar 5, 2026
    affected <= 2026.1.24-3

    OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of se

  • CVE-2026-28480Mar 5, 2026
    affected <= 2026.1.24-3

    OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerability where Telegram allowlist matching accepts mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identity by obtaining recycled usernames to bypass allowlist restrictions an

  • CVE-2026-28478Mar 5, 2026
    affected <= 2026.1.24-3

    OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to webhook endpoints causing memory

  • CVE-2026-28469Mar 5, 2026
    affected <= 2026.1.24-3

    OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification sem

  • CVE-2026-28452Mar 5, 2026
    affected <= 2026.1.24-3

    OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can t

  • CVE-2026-26328Feb 19, 2026
    affected < 2026.2.14fixed 2026.2.14

    OpenClaw is a personal AI assistant. Prior to version 2026.2.14, under iMessage `groupPolicy=allowlist`, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts. Version 2026.2.14 fixes the issue.

  • CVE-2026-26317Feb 19, 2026
    affected <= 2026.1.24-3

    OpenClaw is a personal AI assistant. Prior to 2026.2.14, browser-facing localhost mutation routes accepted cross-origin browser requests without explicit Origin/Referer validation. Loopback binding reduces remote exposure but does not prevent browser-initiated requests from malic

  • CVE-2026-25157Feb 4, 2026
    affected < 2026.1.29fixed 2026.1.29

    OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection vulnerability via the Project Root Path in sshNodeCommand. The sshNodeCommand function constructed a shell script without properly escaping the user-supplied project path in an error

  • CVE-2026-24763Feb 2, 2026
    affected < 2026.1.29fixed 2026.1.29

    OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell com

  • CVE-2026-25253Feb 1, 2026
    affected < 2026.1.29fixed 2026.1.29

    OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.