CVE tracker
301 subscribers
4.25K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-44996 - OpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding

CVE ID :CVE-2026-44996
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.15 contains an arbitrary local file read vulnerability in the webchat audio embedding helper that fails to apply local media root containment checks. Attackers can influence agent or tool-produced ReplyPayload.mediaUrl parameters to resolve absolute local paths or file URLs, read audio-like files, and embed them base64-encoded into webchat responses.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44997 - OpenClaw < 2026.4.22 - Security Envelope Constraint Bypass in ACP Child Sessions

CVE ID :CVE-2026-44997
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.22 contains a security envelope constraint bypass vulnerability allowing restricted subagents to spawn ACP child sessions that fail to inherit depth, child-count limits, control scope, or target-agent restrictions. Attackers can exploit this by spawning child sessions that bypass subagent-only constraints, potentially escalating privileges or accessing restricted resources.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44998 - OpenClaw < 2026.4.20 - Tool Policy Bypass via Bundled MCP/LSP Tools

CVE ID :CVE-2026-44998
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.20 contains a tool policy bypass vulnerability allowing bundled MCP and LSP tools to circumvent configured tool restrictions. Attackers with local agent access can append restricted tools to the effective tool set after policy filtering, bypassing profile policies, allow/deny lists, owner-only restrictions, sandbox policies, and subagent policies.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44999 - OpenClaw < 2026.4.20 - Improper Trust Labeling in Isolated Cron Awareness Events

CVE ID :CVE-2026-44999
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.20 fails to properly preserve untrusted labels for isolated cron awareness events, allowing webhook-triggered cron agent output to be recorded as trusted system events. Attackers can exploit this trust-labeling issue to strengthen prompt-injection attacks by rendering untrusted events as trusted System events.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45000 - OpenClaw < 2026.4.20 - Server-Side Request Forgery via Browser CDP Profile Creation

CVE ID :CVE-2026-45000
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.20 contains a server-side request forgery vulnerability in browser CDP profile creation that skips strict-mode SSRF policy checks. Attackers can create stored profiles pointing to private-network or metadata endpoints that bypass security policies and are later probed during normal profile status operations.
Severity: 5.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45001 - OpenClaw < 2026.4.20 - Gateway Config Mutation Guard Bypass via Agent Tool Access

CVE ID :CVE-2026-45001
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.20 contains a guard bypass vulnerability in the agent-facing gateway config.patch and config.apply endpoints that fails to protect operator-trusted settings including sandbox policy, plugin enablement, gateway auth/TLS, hook routing, MCP server configuration, SSRF policy, and filesystem hardening. A prompt-injected model with access to the owner-only gateway tool can persist unauthorized changes to protected operator settings.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45002 - OpenClaw < 2026.4.20 - Hook Session-Key Bypass via Template Mapping

CVE ID :CVE-2026-45002
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.20 contains a hook session-key bypass vulnerability that allows attackers to circumvent the hooks.allowRequestSessionKey opt-in restriction. Attackers can render externally influenced session keys through templated hook mappings to bypass webhook routing isolation controls.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45003 - OpenClaw < 2026.4.22 - Connector Endpoint Host Override via Workspace dotenv Files

CVE ID :CVE-2026-45003
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.22 allows workspace dotenv files to override connector endpoint hosts for Matrix, Mattermost, IRC, and Synology connectors. Attackers with workspace access can redirect runtime traffic to malicious endpoints by setting endpoint variables in dotenv files.
Severity: 5.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45004 - OpenClaw < 2026.4.23 - Arbitrary Code Execution via setup-api.js in Current Working Directory

CVE ID :CVE-2026-45004
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript under the current user account by placing a malicious extensions//setup-api.js file in a repository and convincing a user to run OpenClaw commands from that directory.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45005 - OpenClaw < 2026.4.23 - Webhook Route Secret Cache Not Invalidated After Rotation

CVE ID :CVE-2026-45005
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.23 caches resolved webhook route secrets backed by SecretRef values, allowing stale secrets to remain valid after rotation and reload. Attackers with previously valid webhook route secrets can continue authenticating requests and invoking configured webhook task flows until gateway or plugin restart.
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45006 - OpenClaw < 2026.4.23 - Unsafe Config Mutation via Gateway Tool Denylist Bypass

CVE ID :CVE-2026-45006
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist protection. Attackers can persist malicious config modifications affecting command execution, network behavior, credentials, and operator policies that survive restart.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4890 - CVE-2026-4890

CVE ID :CVE-2026-4890
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4891 - CVE-2026-4891

CVE ID :CVE-2026-4891
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :A heap-based out-of-bounds read vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4892 - CVE-2026-4892

CVE ID :CVE-2026-4892
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :A heap-based out-of-bounds write vulnerability in the DHCPv6 implementation of dnsmasq allows local attackers to execute arbitrary code with root privileges via a crafted DHCPv6 packet.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4893 - CVE-2026-4893

CVE ID :CVE-2026-4893
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :An information disclosure vulnerability in dnsmasq allows remote attackers to bypass source checks via a crafted DNS packet with RFC 7871 client subnet information.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-5172 - CVE-2026-5172

CVE ID :CVE-2026-5172
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-5266 - Wikimedia Foundation Echo Sensitive Information Exposure

CVE ID :CVE-2026-5266
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Echo. This vulnerability is associated with program files includes/Api/ApiEchoNotifications.Php. This issue affects Echo: from * before 1.43.7, 1.44.4, 1.45.2.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7210 - The expat and elementtree parsers use insufficient entropy for XML hash-flooding protection

CVE ID :CVE-2026-7210
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :`xml.parsers.expat` and `xml.etree.ElementTree` use insufficient entropy for Expat hash-flooding protection, which allows a crafted XML document to trigger hash flooding.\r\n\r\nFully mitigating this vulnerability requires both updating libexpat to 2.8.0 or later and applying this patch.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-7308 - Nexus Repository 3 - Stored Cross-Site Scripting (XSS) via HTML Browse Page

CVE ID :CVE-2026-7308
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :An authenticated user with upload permission to a hosted repository can store content that causes arbitrary JavaScript to execute in the browser of any user who browses that repository directory via the HTML index page in Sonatype Nexus Repository versions 3.6.0 through versions before 3.92.0. This could allow the attacker to perform actions in the context of the victim's session.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8305 - OpenClaw bluebubbles Webhook monitor.ts handleBlueBubblesWebhookRequest improper authentication

CVE ID :CVE-2026-8305
Published : May 11, 2026, 6:16 p.m. | 26 minutes ago
Description :A vulnerability was detected in OpenClaw up to 2026.1.24. The impacted element is the function handleBlueBubblesWebhookRequest of the file extensions/bluebubbles/src/monitor.ts of the component bluebubbles Webhook. Performing a manipulation results in improper authentication. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading to version 2026.2.12 is sufficient to resolve this issue. The patch is named a6653be0265f1f02b9de46c06f52ea7c81a836e6. The affected component should be upgraded.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-42188 - Geyser: Server-Side Request Forgery (SSRF) via Player Head Texture URL

CVE ID :CVE-2026-42188
Published : May 11, 2026, 10:22 p.m. | 21 minutes ago
Description :Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Prior to 2.9.3, a server-side request forgery (SSRF) vulnerability exists in Geyser’s handling of Bedrock player head texture data. By supplying a crafted Base64-encoded skin texture URL via the /give command, an attacker can cause the Minecraft server to issue arbitrary HTTP GET requests to attacker-controlled or internal endpoints. This occurs server-side, without proper URL validation, and can be triggered by a Bedrock client. This vulnerability is fixed in 2.9.3.
Severity: 2.4 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...