Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-45223 | 8.8 HIGH | Crabbox < 0.9.0 Authentication Bypass via Admin Claim Injection |
| CVE-2026-45006 | 8.8 HIGH | OpenClaw < 2026.4.23 - Unsafe Config Mutation via Gateway Tool Denylist Bypass |
| CVE-2026-45004 | 7.8 HIGH | OpenClaw < 2026.4.23 - Arbitrary Code Execution via setup-api.js in Current Working Direct |
| CVE-2026-44995 | 7.3 HIGH | OpenClaw < 2026.4.20 - Arbitrary Code Execution via MCP stdio Environment Variables |
| CVE-2026-45001 | 7.1 HIGH | OpenClaw < 2026.4.20 - Gateway Config Mutation Guard Bypass via Agent Tool Access |
| CVE-2026-45224 | 7.1 HIGH | Crabbox < 0.9.0 Path Traversal via Islo Provider Workspace Resolution |
| CVE-2026-45005 | 6.0 MEDIUM | OpenClaw < 2026.4.23 - Webhook Route Secret Cache Not Invalidated After Rotation |
| CVE-2026-44993 | 5.4 MEDIUM | OpenClaw < 2026.4.20 - Direct Message Misclassification in Feishu Card Actions |
| CVE-2026-44998 | 5.4 MEDIUM | OpenClaw < 2026.4.20 - Tool Policy Bypass via Bundled MCP/LSP Tools |
| CVE-2026-45002 | 5.3 MEDIUM | OpenClaw < 2026.4.20 - Hook Session-Key Bypass via Template Mapping |
| CVE-2026-44999 | 5.3 MEDIUM | OpenClaw < 2026.4.20 - Improper Trust Labeling in Isolated Cron Awareness Events |
| CVE-2026-45000 | 5.0 MEDIUM | OpenClaw < 2026.4.20 - Server-Side Request Forgery via Browser CDP Profile Creation |
| CVE-2026-44992 | 5.0 MEDIUM | OpenClaw 2026.4.5 < 2026.4.20 - MiniMax API Host Override via Workspace dotenv |
| CVE-2026-45003 | 5.0 MEDIUM | OpenClaw < 2026.4.22 - Connector Endpoint Host Override via Workspace dotenv Files |
| CVE-2026-44997 | 4.3 MEDIUM | OpenClaw < 2026.4.22 - Security Envelope Constraint Bypass in ACP Child Sessions |
| CVE-2026-44991 | 4.2 MEDIUM | OpenClaw < 2026.4.21 - Authorization Bypass in Owner-Enforced Commands via Wildcard Channe |
| CVE-2026-44996 | 3.7 LOW | OpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding |
No comments yet