CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad

CVEReports
•about 2 hours ago•CVE-2026-20093
9.8

CVE-2026-20093: Authentication Bypass in Cisco IMC Management Interface

A critical authentication bypass vulnerability in the Cisco Integrated Management Controller (IMC) allows an unauthenticated, remote attacker to reset administrative passwords. The flaw exists due to improper input validation in the user credential update process within the XML API and web management interface.

Amit Schendel
Amit Schendel
4 views•5 min read
•about 2 hours ago•CVE-2026-35038
2.1

CVE-2026-35038: Arbitrary Prototype Read in Signal K Server via JSON-Patch Bypass

Signal K Server prior to version 2.24.0 contains an input validation flaw in its JSON-patch endpoint. The application fails to validate the `from` field during copy and move operations, allowing authenticated users to read sensitive properties from the global prototype object.

Alon Barad
Alon Barad
2 views•7 min read
•about 5 hours ago•CVE-2026-35168
8.8

CVE-2026-35168: Authenticated Remote Code Execution via SQL Injection in OpenSTAManager Aggiornamenti Module

OpenSTAManager versions prior to 2.10.2 contain a high-severity SQL Injection vulnerability in the `Aggiornamenti` module. The application accepts raw SQL statements in JSON format and executes them directly against the database without validation. This flaw enables authenticated attackers to modify database schemas, exfiltrate data, and potentially achieve remote code execution depending on database configuration.

Alon Barad
Alon Barad
7 views•5 min read
•about 5 hours ago•CVE-2026-33026
9.1

CVE-2026-33026: Remote Code Execution via Cryptographic Design Flaw in Nginx UI Backup Mechanism

Nginx UI prior to version 2.3.4 contains a critical cryptographic design flaw in its backup and restore mechanism. The application relies on a circular trust model where backup integrity is protected by user-controlled encryption keys, allowing an attacker to forge backup archives and achieve Remote Code Execution upon restoration.

Alon Barad
Alon Barad
6 views•6 min read
•about 6 hours ago•GHSA-G8XP-QX39-9JQ9
10.0

GHSA-G8XP-QX39-9JQ9: Arbitrary Code Execution via Environment Variable Injection in OpenClaw Host Execution

OpenClaw versions prior to v2026.3.31 contain an environment variable injection vulnerability in the Host Environment Security Policy. An untrusted AI model can achieve arbitrary code execution on the host by supplying specific un-sanitized compiler environment variables during host-exec operations.

Alon Barad
Alon Barad
4 views•7 min read
•about 6 hours ago•GHSA-RG8M-3943-VM6Q
5.1

GHSA-RG8M-3943-VM6Q: Authorization Bypass in OpenClaw Matrix Extension via Reply Context

OpenClaw versions 2026.3.28 and earlier contain an improper authorization vulnerability in the Matrix extension. The application fails to validate the sender of threaded messages or reply contexts against the configured allowlist. This allows unauthorized attackers to inject arbitrary content into the AI assistant's context window when an authorized user interacts with an attacker's message.

Amit Schendel
Amit Schendel
4 views•7 min read
•about 7 hours ago•GHSA-QCC3-JQWP-5VH2
5.3

GHSA-qcc3-jqwp-5vh2: Unauthenticated Resource Exhaustion via LINE Webhook Handler in OpenClaw

The OpenClaw personal AI assistant platform contains a resource exhaustion vulnerability in its LINE webhook handler. The application fails to enforce concurrency limits prior to processing unauthenticated HTTP POST requests, allowing an attacker to cause a Denial of Service (DoS) through rapid CPU and memory consumption.

Alon Barad
Alon Barad
5 views•6 min read
•about 8 hours ago•GHSA-CHFM-XGC4-47RJ
5.3

GHSA-CHFM-XGC4-47RJ: Indirect Prompt Injection via Microsoft Teams History in OpenClaw

OpenClaw personal AI assistant versions prior to v2026.3.31 contain a vulnerability in the Microsoft Teams integration. The software fails to enforce sender allowlist validation on historical thread messages retrieved via the Microsoft Graph API. This omission allows unauthorized participants in a shared thread to embed malicious instructions that the language model subsequently ingests and executes.

Alon Barad
Alon Barad
4 views•7 min read
•about 8 hours ago•GHSA-J9PV-RRCJ-6PFX
8.6

GHSA-j9pv-rrcj-6pfx: Insecure Environment Inheritance and Information Disclosure in OpenClaw

OpenClaw versions prior to v2026.3.31 are vulnerable to information disclosure due to insecure environment inheritance in the SSH-based sandbox backends. The application passes the entire parent process environment, including sensitive AI provider API keys, to child processes.

Amit Schendel
Amit Schendel
2 views•6 min read
•about 9 hours ago•GHSA-CCGF-5RWJ-J3HV
5.1

GHSA-ccgf-5rwj-j3hv: DOM XSS via Unsafe Deserialization in TeleJSON

The telejson package prior to version 6.0.0 contains a DOM-based Cross-Site Scripting (XSS) vulnerability. The package deserializer uses an unsanitized object property, `_constructor-name_`, within a dynamically generated function via `new Function()`. Attackers can supply crafted JSON payloads to achieve arbitrary JavaScript execution in the context of the vulnerable application.

Alon Barad
Alon Barad
5 views•6 min read
•about 10 hours ago•GHSA-9Q7V-8MR7-G23P
7.6

GHSA-9Q7V-8MR7-G23P: Server-Side Request Forgery (SSRF) in OpenClaw AI Assistant

OpenClaw versions prior to v2026.3.31 suffer from a high-severity Server-Side Request Forgery (SSRF) vulnerability. The application fails to validate user-supplied URLs in the Ollama extension and Marketplace plugin downloader, allowing unauthenticated or authenticated attackers to perform outbound HTTP requests to arbitrary internal and external resources.

Amit Schendel
Amit Schendel
4 views•6 min read
•about 10 hours ago•GHSA-FV94-QVG8-XQPW
8.8

GHSA-fv94-qvg8-xqpw: OpenClaw SSH Sandbox Symlink Escape and Arbitrary File Access

OpenClaw versions 2026.3.28 and earlier contain a critical symbolic link handling vulnerability within the SSH sandbox synchronization process. The framework fails to validate symbolic links before executing file uploads via the uploadDirectoryToSshTarget function. This flaw allows an attacker interacting with the AI agent to traverse directory boundaries, resulting in arbitrary file reads from the local system or arbitrary file writes to the remote sandbox host.

Alon Barad
Alon Barad
4 views•9 min read
SeverityExploitPeriodCatalog
Sort

Or generate a custom report

Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis

Automated vulnerability intelligence. 1,350+ reports.