Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-28477 (GCVE-0-2026-28477)
Vulnerability from cvelistv5 – Published: 2026-03-05 21:59 – Updated: 2026-03-09 18:11- CWE-352 - Cross-Site Request Forgery (CSRF)
| URL | Tags |
|---|---|
| https://github.com/openclaw/openclaw/security/adv… | vendor-advisory |
| https://github.com/openclaw/openclaw/commit/a99ad… | patch |
| https://www.vulncheck.com/advisories/openclaw-oau… | third-party-advisory |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-28477",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-09T18:11:01.470947Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-09T18:11:21.420Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageURL": "pkg:npm/openclaw",
"product": "OpenClaw",
"vendor": "OpenClaw",
"versions": [
{
"lessThan": "2026.2.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "2026.2.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Aether AI (@aether-ai-agent)"
}
],
"datePublic": "2026-02-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eOpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.\u003c/p\u003e"
}
],
"value": "OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-06T16:40:10.533Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "GitHub Security Advisory (GHSA-7rcp-mxpq-72pj)",
"tags": [
"vendor-advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj"
},
{
"name": "Patch Commit",
"tags": [
"patch"
],
"url": "https://github.com/openclaw/openclaw/commit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47"
},
{
"name": "VulnCheck Advisory: OpenClaw \u003c 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-oauth-state-validation-bypass-in-manual-chutes-login-flow"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "OpenClaw \u003c 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2026-28477",
"datePublished": "2026-03-05T21:59:52.893Z",
"dateReserved": "2026-02-27T19:20:11.110Z",
"dateUpdated": "2026-03-09T18:11:21.420Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-28477",
"date": "2026-05-14",
"epss": "0.00021",
"percentile": "0.06019"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-28477\",\"sourceIdentifier\":\"disclosure@vulncheck.com\",\"published\":\"2026-03-05T22:16:22.007\",\"lastModified\":\"2026-03-17T18:04:14.913\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.\"},{\"lang\":\"es\",\"value\":\"Las versiones de OpenClaw anteriores a 2026.2.14 contienen una vulnerabilidad de omisi\u00f3n de validaci\u00f3n de estado de OAuth en el flujo de inicio de sesi\u00f3n manual de Chutes que permite a los atacantes omitir la protecci\u00f3n CSRF. Un atacante puede convencer a un usuario de pegar datos de devoluci\u00f3n de llamada de OAuth controlados por el atacante, lo que permite la sustituci\u00f3n de credenciales y la persistencia de tokens para cuentas no autorizadas.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"ACTIVE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"2026.2.14\",\"matchCriteriaId\":\"0F3079A3-9FBD-4E87-821D-5CAF0622C555\"}]}]}],\"references\":[{\"url\":\"https://github.com/openclaw/openclaw/commit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.vulncheck.com/advisories/openclaw-oauth-state-validation-bypass-in-manual-chutes-login-flow\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-28477\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-09T18:11:01.470947Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-09T18:11:15.362Z\"}}], \"cna\": {\"title\": \"OpenClaw \u003c 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Aether AI (@aether-ai-agent)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 5.9, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"ACTIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"OpenClaw\", \"product\": \"OpenClaw\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2026.2.14\", \"versionType\": \"custom\"}], \"packageURL\": \"pkg:npm/openclaw\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-02-16T00:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj\", \"name\": \"GitHub Security Advisory (GHSA-7rcp-mxpq-72pj)\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/openclaw/openclaw/commit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47\", \"name\": \"Patch Commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://www.vulncheck.com/advisories/openclaw-oauth-state-validation-bypass-in-manual-chutes-login-flow\", \"name\": \"VulnCheck Advisory: OpenClaw \u003c 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"vulncheck\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eOpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-352\", \"description\": \"Cross-Site Request Forgery (CSRF)\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"2026.2.14\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"shortName\": \"VulnCheck\", \"dateUpdated\": \"2026-03-06T16:40:10.533Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-28477\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-09T18:11:21.420Z\", \"dateReserved\": \"2026-02-27T19:20:11.110Z\", \"assignerOrgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"datePublished\": \"2026-03-05T21:59:52.893Z\", \"assignerShortName\": \"VulnCheck\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-7RCP-MXPQ-72PJ
Vulnerability from github – Published: 2026-02-18 17:41 – Updated: 2026-03-06 01:04Summary
The manual Chutes OAuth login flow could accept attacker-controlled callback input in a way that bypassed OAuth CSRF state validation, potentially resulting in credential substitution.
Impact
If an attacker can convince a user to paste attacker-provided OAuth callback data during the manual login prompt, OpenClaw may exchange an attacker-obtained authorization code and persist tokens for the wrong Chutes account.
The automatic local callback flow is not affected (it validates state in the local HTTP callback handler).
Affected Packages / Versions
openclaw(npm):<= 2026.2.13when using the manual Chutes OAuth login flow.
Fix
The manual flow now requires the full redirect URL (must include code and state), validates the returned state against the expected value, and rejects code-only pastes.
Fix Commit(s)
- a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47
Thanks @aether-ai-agent for reporting.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.2.14"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-28477"
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-18T17:41:00Z",
"nvd_published_at": "2026-03-05T22:16:22Z",
"severity": "MODERATE"
},
"details": "## Summary\n\nThe manual Chutes OAuth login flow could accept attacker-controlled callback input in a way that bypassed OAuth CSRF state validation, potentially resulting in credential substitution.\n\n## Impact\n\nIf an attacker can convince a user to paste attacker-provided OAuth callback data during the manual login prompt, OpenClaw may exchange an attacker-obtained authorization code and persist tokens for the wrong Chutes account.\n\nThe automatic local callback flow is not affected (it validates state in the local HTTP callback handler).\n\n## Affected Packages / Versions\n\n- `openclaw` (npm): `\u003c= 2026.2.13` when using the manual Chutes OAuth login flow.\n\n## Fix\n\nThe manual flow now requires the full redirect URL (must include `code` and `state`), validates the returned `state` against the expected value, and rejects code-only pastes.\n\n## Fix Commit(s)\n\n- a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47\n\nThanks @aether-ai-agent for reporting.",
"id": "GHSA-7rcp-mxpq-72pj",
"modified": "2026-03-06T01:04:48Z",
"published": "2026-02-18T17:41:00Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28477"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-oauth-state-validation-bypass-in-manual-chutes-login-flow"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenClaw Chutes manual OAuth state validation bypass can cause credential substitution"
}
FKIE_CVE-2026-28477
Vulnerability from fkie_nvd - Published: 2026-03-05 22:16 - Updated: 2026-03-17 18:04{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "0F3079A3-9FBD-4E87-821D-5CAF0622C555",
"versionEndExcluding": "2026.2.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts."
},
{
"lang": "es",
"value": "Las versiones de OpenClaw anteriores a 2026.2.14 contienen una vulnerabilidad de omisi\u00f3n de validaci\u00f3n de estado de OAuth en el flujo de inicio de sesi\u00f3n manual de Chutes que permite a los atacantes omitir la protecci\u00f3n CSRF. Un atacante puede convencer a un usuario de pegar datos de devoluci\u00f3n de llamada de OAuth controlados por el atacante, lo que permite la sustituci\u00f3n de credenciales y la persistencia de tokens para cuentas no autorizadas."
}
],
"id": "CVE-2026-28477",
"lastModified": "2026-03-17T18:04:14.913",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-03-05T22:16:22.007",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Patch"
],
"url": "https://github.com/openclaw/openclaw/commit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-oauth-state-validation-bypass-in-manual-chutes-login-flow"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
}
CNVD-2026-13593
Vulnerability from cnvd - Published: 2026-03-13目前厂商已发布升级补丁以修复漏洞。补丁获取链接: https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj
| Name | OpenClaw OpenClaw <2026.2.14 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2026-28477",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2026-28477"
}
},
"description": "OpenClaw\u662fopenclaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\n\nOpenClaw\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u624b\u52a8Chutes\u767b\u5f55\u6d41\u7a0b\u4e2d\u5b58\u5728OAuth\u72b6\u6001\u9a8c\u8bc1\u7ed5\u8fc7\u95ee\u9898\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7CSRF\u4fdd\u62a4\uff0c\u5b9e\u73b0\u51ed\u636e\u66ff\u6362\u548c\u672a\u6388\u6743\u8d26\u6237\u7684\u4ee4\u724c\u6301\u4e45\u5316\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\u3002\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2026-13593",
"openTime": "2026-03-13",
"patchDescription": "OpenClaw\u662fopenclaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\r\n\r\nOpenClaw\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u624b\u52a8Chutes\u767b\u5f55\u6d41\u7a0b\u4e2d\u5b58\u5728OAuth\u72b6\u6001\u9a8c\u8bc1\u7ed5\u8fc7\u95ee\u9898\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7CSRF\u4fdd\u62a4\uff0c\u5b9e\u73b0\u51ed\u636e\u66ff\u6362\u548c\u672a\u6388\u6743\u8d26\u6237\u7684\u4ee4\u724c\u6301\u4e45\u5316\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "OpenClaw\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2026-13593\uff09\u7684\u8865\u4e01",
"products": {
"product": "OpenClaw OpenClaw \u003c2026.2.14"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2026-28477",
"serverity": "\u9ad8",
"submitTime": "2026-03-12",
"title": "OpenClaw\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2026-13593\uff09"
}
WID-SEC-W-2026-0424
Vulnerability from csaf_certbund - Published: 2026-02-15 23:00 - Updated: 2026-03-05 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenClaw ist ein pers\u00f6nlicher KI-Assistent zur Ausf\u00fchrung auf eigenen Ger\u00e4ten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann diese Schwachstellen in OpenClaw ausnutzen, um beliebigen Programmcode auszuf\u00fchren, sich erh\u00f6hte Berechtigungen zu verschaffen, Sicherheitsma\u00dfnahmen zu umgehen, Daten zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder andere, nicht n\u00e4her bezeichnete Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0424 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0424.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0424 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0424"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-33rq-m5x2-fvgf"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3fqr-4cg8-h96q"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3hcm-ggvf-rch5"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3m3q-x3gj-f79x"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4564-pvr2-qq4h"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-47q7-97xp-m272"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4hg8-92x6-h2f3"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4rj2-gpmh-qq5x"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-56f2-hvwg-5743"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5xfq-5mr7-426q"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-64qx-vpxx-mvqf"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-782p-5fr5-7fj8"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7q2j-c4q5-rm27"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7vwx-582j-j332"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7xhj-55q9-pc3m"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8mh7-phf8-xgfm"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-943q-mwmv-hhvh"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-c37p-4qqg-3p76"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-chm2-m3w2-wcxm"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cv7m-c9jx-vg7q"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fhvm-j76f-qmjv"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g27f-9qjv-22pm"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g34w-4xqq-h79m"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g6q9-8fvw-f7rf"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gq9c-wg68-gwj2"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gv46-4xfq-jv58"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h3f9-mjwj-w476"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h89v-j3x9-8wqj"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h9g4-589h-68xv"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hv93-r4j3-q65f"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-j27p-hq53-9wgc"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jfv4-h8mc-jcp8"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jmm5-fvh5-gf4p"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jqpq-mgvm-f9r6"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jrvc-8ff5-2f9f"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-m7x8-2w3w-pr42"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mj5r-hh7j-4gxf"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mp5h-m6qj-6292"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mqpw-46fh-299h"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mr32-vwc2-5j6h"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mv9j-6xhh-g383"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-p25h-9q54-ffvw"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pchc-86f6-8758"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pg2v-8xwh-qhcc"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pv58-549p-qh99"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-q447-rj3r-2cgh"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qj77-c3c8-9c3q"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qpjj-47vm-64pj"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qrq5-wjgg-rvqw"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qw99-grcx-4pvm"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-r5h9-vjqc-hq3r"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rmxw-jxxx-4cpc"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rv39-79c4-7459"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rwj8-p9vq-25gv"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6c6-vqqg-w888"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v773-r54f-q32w"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v892-hwpg-jwqp"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w2cg-vxx6-5xjg"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w5c7-9qqw-6645"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wfp2-v9c7-fh79"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x22m-j5qq-j49m"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xc7w-v5x6-cc87"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xvhf-x56f-2hpp"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xw4p-pw82-hqr7"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xwjm-j929-xq7c"
}
],
"source_lang": "en-US",
"title": "OpenClaw: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T07:07:21.689+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0424",
"initial_release_date": "2026-02-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2026.2.14",
"product": {
"name": "Open Source OpenClaw \u003c2026.2.14",
"product_id": "T050918"
}
},
{
"category": "product_version",
"name": "2026.2.14",
"product": {
"name": "Open Source OpenClaw 2026.2.14",
"product_id": "T050918-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openclaw:openclaw:2026.2.14"
}
}
}
],
"category": "product_name",
"name": "OpenClaw"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-28391",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28391"
},
{
"cve": "CVE-2026-28392",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28392"
},
{
"cve": "CVE-2026-28393",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28393"
},
{
"cve": "CVE-2026-28395",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28395"
},
{
"cve": "CVE-2026-28446",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28446"
},
{
"cve": "CVE-2026-28447",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28447"
},
{
"cve": "CVE-2026-28448",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28448"
},
{
"cve": "CVE-2026-28450",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28450"
},
{
"cve": "CVE-2026-28451",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28451"
},
{
"cve": "CVE-2026-28452",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28452"
},
{
"cve": "CVE-2026-28453",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28453"
},
{
"cve": "CVE-2026-28454",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28454"
},
{
"cve": "CVE-2026-28456",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28456"
},
{
"cve": "CVE-2026-28457",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28457"
},
{
"cve": "CVE-2026-28458",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28458"
},
{
"cve": "CVE-2026-28459",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28459"
},
{
"cve": "CVE-2026-28462",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28462"
},
{
"cve": "CVE-2026-28463",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28463"
},
{
"cve": "CVE-2026-28464",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28464"
},
{
"cve": "CVE-2026-28465",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28465"
},
{
"cve": "CVE-2026-28466",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28466"
},
{
"cve": "CVE-2026-28467",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28467"
},
{
"cve": "CVE-2026-28468",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28468"
},
{
"cve": "CVE-2026-28469",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28469"
},
{
"cve": "CVE-2026-28470",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28470"
},
{
"cve": "CVE-2026-28471",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28471"
},
{
"cve": "CVE-2026-28472",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28472"
},
{
"cve": "CVE-2026-28473",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28473"
},
{
"cve": "CVE-2026-28474",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28474"
},
{
"cve": "CVE-2026-28475",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28475"
},
{
"cve": "CVE-2026-28476",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28476"
},
{
"cve": "CVE-2026-28477",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28477"
},
{
"cve": "CVE-2026-28478",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28478"
},
{
"cve": "CVE-2026-28480",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28480"
},
{
"cve": "CVE-2026-28481",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28481"
},
{
"cve": "CVE-2026-28482",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28482"
},
{
"cve": "CVE-2026-28485",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28485"
},
{
"cve": "CVE-2026-28486",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28486"
},
{
"cve": "CVE-2026-29606",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29606"
},
{
"cve": "CVE-2026-29609",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29609"
},
{
"cve": "CVE-2026-29610",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29610"
},
{
"cve": "CVE-2026-29611",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29611"
},
{
"cve": "CVE-2026-29612",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29612"
},
{
"cve": "CVE-2026-29613",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29613"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.