The OpenClaw platform versions up to 2026.3.24 contain a high-severity incorrect authorization vulnerability within the Gateway Plugin Subagent runtime. A hardcoded synthetic scope grants administrative privileges to the `deleteSession` method, allowing any plugin to bypass authorization and delete arbitrary session data across the instance.
OpenClaw versions up to 2026.3.24 contain an authorization bypass vulnerability in the Microsoft Teams extension. The flaw allows unauthorized users to bypass sender allowlists by sending specially crafted `invoke` activities, leading to unauthorized session feedback recording and potential feedback reflection.
The OpenClaw personal AI assistant suffers from an Improper Restriction of Excessive Authentication Attempts (CWE-307) vulnerability within its Synology Chat integration. Due to improper placement of rate-limiting logic, unauthenticated attackers can continuously brute-force webhook authentication tokens without triggering defensive mechanisms, potentially leading to unauthorized message spoofing and unauthenticated interaction with the underlying AI models.
OpenClaw versions up to 2026.3.24 suffer from an authorization bypass in the Telegram integration. The vulnerability allows unauthorized users to send inline button callbacks that mutate session state, circumventing the direct message pairing restrictions.
The OpenClaw Assistant Control Protocol (ACP) CLI suffers from an ANSI escape sequence injection vulnerability due to insufficient input sanitization of tool metadata. This flaw permits an attacker to leverage Control Sequence Introducer (CSI) commands to manipulate terminal output, redress security prompts, and trick users into authorizing malicious command execution.
The OpenCC (Open Chinese Convert) library prior to version 1.2.0 contains two independent heap-based out-of-bounds read vulnerabilities. These flaws reside in the UTF-8 processing logic and occur when handling malformed or truncated multi-byte character sequences. Exploitation results in denial-of-service conditions or the disclosure of adjacent heap memory.
Home Assistant versions prior to 2026.01 are vulnerable to a stored Cross-Site Scripting (XSS) flaw in the Map-card component. An authenticated attacker can inject malicious JavaScript into an entity name, which executes when a victim hovers over historical movement data points in the dashboard.
A Stored Cross-Site Scripting (XSS) vulnerability exists in the Home Assistant frontend, specifically within the History-graph card component. The flaw allows authenticated users with low privileges or malicious third-party integrations to inject arbitrary JavaScript via unescaped entity names. This script executes when a victim hovers over the associated graph, potentially leading to full account takeover.
Traefik versions prior to 2.11.42, 3.6.12, and 3.7.0-ea.3 contain a vulnerability in the BasicAuth and DigestAuth middlewares. When configured with a non-canonical headerField name, attackers with valid low-privileged credentials can inject canonicalized headers to bypass authentication logic and spoof their identity to backend services.
DOMPurify versions prior to 3.3.2 are susceptible to a Mutation Cross-Site Scripting (mXSS) vulnerability. The flaw occurs due to discrepancies in browser parsing contexts when handling specific raw-text or RCDATA elements, allowing attackers to bypass sanitization.
Kirby CMS through version 5.1.4 contains a persistent Denial of Service (DoS) vulnerability triggered by malformed image uploads. The application fails to validate the return value of the PHP getimagesize() function, resulting in a fatal TypeError that renders affected administrative or frontend pages permanently inaccessible until the malformed file is manually removed.
The AWS SDK for .NET contains a vulnerability in its CloudFront signing utilities where improper escaping of special characters permits JSON policy injection. Attackers who can control input passed to the signing methods can alter the generated CloudFront custom policy, allowing them to bypass access restrictions and access private resources.
Or generate a custom report
Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis
Automated vulnerability intelligence. 1,288+ reports.