VYPR

npm package

openclaw

pkg:npm/openclaw

Vulnerabilities (392)

  • CVE-2026-43567MedMay 5, 2026
    affected < 2026.4.10fixed 2026.4.10

    OpenClaw before 2026.4.10 contains a path traversal vulnerability in the screen_record tool's outPath parameter that bypasses workspace-only filesystem guards. Attackers can exploit this by specifying an outPath outside the workspace boundary to write files to unintended location

  • CVE-2026-43566CriMay 5, 2026
    affected >= 2026.4.7, < 2026.4.14fixed 2026.4.14

    OpenClaw versions 2026.4.7 before 2026.4.14 contain a privilege escalation vulnerability where heartbeat owner downgrade logic skips webhook wake events carrying untrusted content. Attackers can exploit this by sending untrusted webhook wake events to preserve owner-like executio

  • CVE-2026-43535MedMay 5, 2026
    affected < 2026.4.14fixed 2026.4.14

    OpenClaw before 2026.4.14 contains an authorization context reuse vulnerability in collect-mode queue batches that allows messages from different senders to inherit the final sender's authorization context. Attackers can exploit this by sending multiple queued messages to drain b

  • CVE-2026-43534CriMay 5, 2026
    affected < 2026.4.10fixed 2026.4.10

    OpenClaw before 2026.4.10 contains an input validation vulnerability that allows external hook metadata to be enqueued as trusted system events. Attackers can supply malicious hook names to escalate untrusted input into higher-trust agent context.

  • CVE-2026-43533HigMay 5, 2026
    affected < 2026.4.10fixed 2026.4.10

    OpenClaw before 2026.4.10 contains an arbitrary file read vulnerability in QQBot media tags that allows attackers to reference host-local paths outside the intended media storage boundary. Attackers can craft malicious reply text containing media tags to disclose arbitrary local

  • CVE-2026-43532HigMay 5, 2026
    affected >= 2026.4.7, < 2026.4.10fixed 2026.4.10

    OpenClaw versions 2026.4.7 before 2026.4.10 fail to normalize Discord event cover image parameters in sandbox media processing. Attackers can bypass media normalization to inject host-local media references into channel action paths expecting normalized media.

  • CVE-2026-43531HigMay 5, 2026
    affected < 2026.4.9fixed 2026.4.9

    OpenClaw before 2026.4.9 contains an environment variable injection vulnerability allowing malicious workspace .env files to set runtime-control variables. Attackers can inject variables affecting update sources, gateway URLs, ClawHub resolution, and browser executable paths to c

  • CVE-2026-43530HigMay 5, 2026
    affected >= 2026.2.23, < 2026.4.12fixed 2026.4.12

    OpenClaw versions 2026.2.23 before 2026.4.12 contain a weakened exec approval binding vulnerability in busybox and toybox applet execution that allows attackers to obscure which applet would actually run. Attackers can exploit opaque multi-call binaries to bypass exec approval me

  • CVE-2026-43529LowMay 5, 2026
    affected < 2026.4.10fixed 2026.4.10

    OpenClaw before 2026.4.10 contains a time-of-check-time-of-use vulnerability in the validateScriptFileForShellBleed function that allows local attackers to bypass workspace boundary checks. An attacker with workspace write access can race-condition swap the target file between va

  • CVE-2026-43528MedMay 5, 2026
    affected < 2026.4.14fixed 2026.4.14

    OpenClaw before 2026.4.14 contains a redaction bypass vulnerability that allows authenticated gateway clients to receive unredacted secrets through sourceConfig and runtimeConfig alias fields. Attackers with config read access can exploit this to obtain provider API keys, gateway

  • CVE-2026-43527HigMay 5, 2026
    affected < 2026.4.14fixed 2026.4.14

    OpenClaw before 2026.4.14 contains a server-side request forgery vulnerability in browser SSRF policy that allows private-network navigation by default. Attackers can exploit this misconfiguration to access internal services or metadata endpoints through browser-driven requests.

  • CVE-2026-43526HigMay 5, 2026
    affected < 2026.4.12fixed 2026.4.12

    OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequen

  • CVE-2026-42439HigMay 5, 2026
    affected < 2026.4.10fixed 2026.4.10

    OpenClaw before 2026.4.10 contains a server-side request forgery policy bypass vulnerability in the browser tabs action select and close routes. Attackers can bypass configured browser SSRF policy protections by exploiting the /tabs/action endpoint to perform unauthorized tab nav

  • CVE-2026-42438HigMay 5, 2026
    affected >= 2026.4.9, < 2026.4.10fixed 2026.4.10

    OpenClaw versions 2026.4.9 before 2026.4.10 contain a sender policy bypass vulnerability in the outbound host-media attachment read helper that allows unauthorized local file disclosure. Attackers with denied read access via toolsBySender or group policy can trigger host-media at

  • CVE-2026-42437HigMay 5, 2026
    affected >= 2026.4.9, < 2026.4.10fixed 2026.4.10

    OpenClaw versions 2026.4.9 before 2026.4.10 contain a denial of service vulnerability in the voice-call realtime WebSocket path that accepts oversized frames without proper validation. Remote attackers can send oversized WebSocket frames to cause service unavailability for deploy

  • CVE-2026-42436HigMay 5, 2026
    affected < 2026.4.14fixed 2026.4.14

    OpenClaw before 2026.4.14 contains an improper access control vulnerability in browser snapshot, screenshot, and tab routes that fail to consistently validate the final browser target after navigation. Authenticated callers can bypass SSRF restrictions to expose internal or disal

  • CVE-2026-42435HigMay 5, 2026
    affected >= 2026.2.22, < 2026.4.12fixed 2026.4.12

    OpenClaw versions from 2026.2.22 before 2026.4.12 contain an insufficient shell-wrapper detection vulnerability allowing attackers to inject environment variable assignments at the argv level. Attackers can bypass exec preflight handling to manipulate high-risk shell variables li

  • CVE-2026-42434HigMay 5, 2026
    affected >= 2026.4.5, < 2026.4.10fixed 2026.4.10

    OpenClaw versions 2026.4.5 before 2026.4.10 contain a sandbox escape vulnerability allowing sandboxed agents to override exec routing by specifying host=node. Attackers can bypass sandbox boundaries and route execution to remote nodes instead of intended sandbox paths.

  • CVE-2026-42433MedMay 5, 2026
    affected < 2026.4.10fixed 2026.4.10

    OpenClaw before 2026.4.10 contains an authorization bypass vulnerability allowing operator.write message-tool paths to access Matrix profile persistence requiring admin-level authority. Attackers can exploit insufficient access controls to mutate persistent profile configuration

  • CVE-2026-42432HigApr 28, 2026
    affected < 2026.4.8fixed 2026.4.8

    OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute privileged commands on the local ass

Page 2 of 20