CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad

CVEReports
•14 minutes ago•GHSA-H4JX-HJR3-FHGC
8.8

GHSA-H4JX-HJR3-FHGC: Privilege Escalation via Synthetic Administrator Scopes in OpenClaw Gateway Plugin Subagent

The OpenClaw platform versions up to 2026.3.24 contain a high-severity incorrect authorization vulnerability within the Gateway Plugin Subagent runtime. A hardcoded synthetic scope grants administrative privileges to the `deleteSession` method, allowing any plugin to bypass authorization and delete arbitrary session data across the instance.

Amit Schendel
Amit Schendel
0 views•5 min read
•about 1 hour ago•GHSA-RF6H-5GPW-QRGQ
5.3

GHSA-RF6H-5GPW-QRGQ: Authorization Bypass in OpenClaw Microsoft Teams Extension via Invoke Activities

OpenClaw versions up to 2026.3.24 contain an authorization bypass vulnerability in the Microsoft Teams extension. The flaw allows unauthorized users to bypass sender allowlists by sending specially crafted `invoke` activities, leading to unauthorized session feedback recording and potential feedback reflection.

Amit Schendel
Amit Schendel
0 views•4 min read
•about 1 hour ago•GHSA-MF5G-6R6F-GHHM
5.3

GHSA-MF5G-6R6F-GHHM: Pre-Authentication Rate-Limit Bypass in OpenClaw Synology Chat Plugin

The OpenClaw personal AI assistant suffers from an Improper Restriction of Excessive Authentication Attempts (CWE-307) vulnerability within its Synology Chat integration. Due to improper placement of rate-limiting logic, unauthenticated attackers can continuously brute-force webhook authentication tokens without triggering defensive mechanisms, potentially leading to unauthorized message spoofing and unauthenticated interaction with the underlying AI models.

Amit Schendel
Amit Schendel
0 views•6 min read
•about 2 hours ago•GHSA-J4C9-W69R-CW33
8.7

GHSA-j4c9-w69r-cw33: Authorization Bypass in OpenClaw Telegram Integration via Inline Button Callbacks

OpenClaw versions up to 2026.3.24 suffer from an authorization bypass in the Telegram integration. The vulnerability allows unauthorized users to send inline button callbacks that mutate session state, circumventing the direct message pairing restrictions.

Alon Barad
Alon Barad
0 views•6 min read
•about 2 hours ago•GHSA-4HMJ-39M8-JWC7
5.3

GHSA-4HMJ-39M8-JWC7: ANSI Escape Sequence Injection in OpenClaw ACP Prompts

The OpenClaw Assistant Control Protocol (ACP) CLI suffers from an ANSI escape sequence injection vulnerability due to insufficient input sanitization of tool metadata. This flaw permits an attacker to leverage Control Sequence Introducer (CSI) commands to manipulate terminal output, redress security prompts, and trick users into authorizing malicious command execution.

Amit Schendel
Amit Schendel
2 views•6 min read
•about 3 hours ago•GHSA-7FQQ-Q52P-2JJG
7.5

GHSA-7FQQ-Q52P-2JJG: Out-of-Bounds Read in OpenCC via Truncated UTF-8 Sequences

The OpenCC (Open Chinese Convert) library prior to version 1.2.0 contains two independent heap-based out-of-bounds read vulnerabilities. These flaws reside in the UTF-8 processing logic and occur when handling malformed or truncated multi-byte character sequences. Exploitation results in denial-of-service conditions or the disclosure of adjacent heap memory.

Alon Barad
Alon Barad
3 views•7 min read
•about 24 hours ago•CVE-2026-33044
7.3

CVE-2026-33044: Stored Cross-Site Scripting in Home Assistant Map-Card

Home Assistant versions prior to 2026.01 are vulnerable to a stored Cross-Site Scripting (XSS) flaw in the Map-card component. An authenticated attacker can inject malicious JavaScript into an entity name, which executes when a victim hovers over historical movement data points in the dashboard.

Alon Barad
Alon Barad
4 views•7 min read
•1 day ago•CVE-2026-33045
7.3

CVE-2026-33045: Stored Cross-Site Scripting in Home Assistant History-Graph Card

A Stored Cross-Site Scripting (XSS) vulnerability exists in the Home Assistant frontend, specifically within the History-graph card component. The flaw allows authenticated users with low privileges or malicious third-party integrations to inject arbitrary JavaScript via unescaped entity names. This script executes when a victim hovers over the associated graph, potentially leading to full account takeover.

Alon Barad
Alon Barad
6 views•6 min read
•1 day ago•CVE-2026-33433
5.1

CVE-2026-33433: Authentication Spoofing via Header Canonicalization Bypass in Traefik Middlewares

Traefik versions prior to 2.11.42, 3.6.12, and 3.7.0-ea.3 contain a vulnerability in the BasicAuth and DigestAuth middlewares. When configured with a non-canonical headerField name, attackers with valid low-privileged credentials can inject canonicalized headers to bypass authentication logic and spoof their identity to backend services.

Amit Schendel
Amit Schendel
6 views•7 min read
•1 day ago•GHSA-H8R8-WCCR-V5F2
6.5

GHSA-H8R8-WCCR-V5F2: Mutation-XSS via Re-Contextualization in DOMPurify

DOMPurify versions prior to 3.3.2 are susceptible to a Mutation Cross-Site Scripting (mXSS) vulnerability. The flaw occurs due to discrepancies in browser parsing contexts when handling specific raw-text or RCDATA elements, allowing attackers to bypass sanitization.

Amit Schendel
Amit Schendel
8 views•6 min read
•1 day ago•CVE-2026-29905
6.5

CVE-2026-29905: Persistent Denial of Service via Malformed Image Upload in Kirby CMS

Kirby CMS through version 5.1.4 contains a persistent Denial of Service (DoS) vulnerability triggered by malformed image uploads. The application fails to validate the return value of the PHP getimagesize() function, resulting in a fatal TypeError that renders affected administrative or frontend pages permanently inaccessible until the malformed file is manually removed.

Amit Schendel
Amit Schendel
7 views•7 min read
•1 day ago•GHSA-MVM6-F9R3-FGFX
9.3

GHSA-mvm6-f9r3-fgfx: JSON Policy Injection in AWS SDK for .NET CloudFront Signers

The AWS SDK for .NET contains a vulnerability in its CloudFront signing utilities where improper escaping of special characters permits JSON policy injection. Attackers who can control input passed to the signing methods can alter the generated CloudFront custom policy, allowing them to bypass access restrictions and access private resources.

Amit Schendel
Amit Schendel
7 views•6 min read
SeverityExploitPeriodCatalog
Sort

Or generate a custom report

Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis

Automated vulnerability intelligence. 1,288+ reports.