| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-32058 | OpenClaw < 2026.2.26 - Approval Context-Binding Weakness in system.run via host=node | OpenClaw | OpenClaw | Low | 2.6 | 2026-03-21 00:42:29 | Deep Dive |
| CVE-2026-32064 | OpenClaw < 2026.2.21 - Missing VNC Authentication in Sandbox Browser noVNC Observer | OpenClaw | OpenClaw | High | 7.7 | 2026-03-21 00:42:29 | Deep Dive |
| CVE-2026-32057 | OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter | OpenClaw | OpenClaw | High | 7.1 | 2026-03-21 00:42:28 | Deep Dive |
| CVE-2026-32056 | OpenClaw < 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in system.run | OpenClaw | OpenClaw | High | 7.5 | 2026-03-21 00:42:27 | Deep Dive |
| CVE-2026-32054 | OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling | OpenClaw | OpenClaw | Medium | 6.5 | 2026-03-21 00:42:26 | Deep Dive |
| CVE-2026-32055 | OpenClaw < 2026.2.26 - Workspace Path Boundary Bypass via Non-existent Symlink | OpenClaw | OpenClaw | High | 7.6 | 2026-03-21 00:42:26 | Deep Dive |
| CVE-2026-32053 | OpenClaw < 2026.2.23 - Twilio Webhook Replay Bypass via Randomized Event ID Normalization | OpenClaw | OpenClaw | Medium | 6.5 | 2026-03-21 00:42:25 | Deep Dive |
| CVE-2026-32052 | OpenClaw < 2026.2.24 - Hidden Command Execution via Shell-Wrapper Positional argv Carriers | OpenClaw | OpenClaw | Medium | 6.4 | 2026-03-21 00:42:24 | Deep Dive |
| CVE-2026-32050 | OpenClaw < 2026.2.25 - Unauthorized Reaction Status Event Enqueue via Access Check Bypass | OpenClaw | OpenClaw | Low | 3.7 | 2026-03-21 00:42:23 | Deep Dive |
| CVE-2026-32051 | OpenClaw < 2026.3.1 - Authorization Bypass in Agent Runs via Owner-Only Tool Access | OpenClaw | OpenClaw | High | 8.8 | 2026-03-21 00:42:23 | Deep Dive |
| CVE-2026-32049 | OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass | OpenClaw | OpenClaw | High | 7.5 | 2026-03-21 00:42:22 | Deep Dive |
| CVE-2026-32048 | OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn | OpenClaw | OpenClaw | High | 7.5 | 2026-03-21 00:42:21 | Deep Dive |
| CVE-2026-32045 | OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth | OpenClaw | OpenClaw | Medium | 5.9 | 2026-03-21 00:42:20 | Deep Dive |
| CVE-2026-32046 | OpenClaw < 2026.2.21 - OS-level Sandbox Bypass via --no-sandbox Flag | OpenClaw | OpenClaw | Medium | 5.3 | 2026-03-21 00:42:20 | Deep Dive |
| CVE-2026-32044 | OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation | OpenClaw | OpenClaw | Medium | 5.5 | 2026-03-21 00:42:19 | Deep Dive |
| CVE-2026-32042 | OpenClaw < 2026.2.25 - Privilege Escalation via Unpaired Device Identity in Shared Gateway Authentication | OpenClaw | OpenClaw | High | 8.8 | 2026-03-21 00:42:18 | Deep Dive |
| CVE-2026-32043 | OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Parameter | OpenClaw | OpenClaw | Medium | 6.5 | 2026-03-21 00:42:18 | Deep Dive |
| CVE-2026-22172 | OpenClaw < 2026.3.12 - Scope Elevation in WebSocket Shared-Auth Connections | OpenClaw | OpenClaw | Critical | 9.9 | 2026-03-20 14:48:29 | Deep Dive |
| CVE-2026-32041 | OpenClaw < 2026.3.1 - Unauthenticated Browser Control Access via Failed Auth Bootstrap | OpenClaw | OpenClaw | Medium | 6.9 | 2026-03-19 22:07:15 | Deep Dive |
| CVE-2026-32040 | OpenClaw < 2026.2.23 - HTML Injection via Unvalidated Image MIME Type in Data-URL Interpolation | OpenClaw | OpenClaw | Medium | 4.6 | 2026-03-19 22:07:14 | Deep Dive |