Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-41330 (GCVE-0-2026-41330)
Vulnerability from cvelistv5 – Published: 2026-04-20 23:08 – Updated: 2026-04-21 13:39 X_Open Source
VLAI?
EPSS
Title
OpenClaw < 2026.3.31 - Environment Variable Override via Host Exec Policy
Summary
OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, Docker restrictions, and Git TLS enforcement.
Severity ?
CWE
- CWE-453 - Insecure Default Variable Initialization
Assigner
References
3 references
| URL | Tags |
|---|---|
| https://github.com/openclaw/openclaw/security/adv… | vendor-advisory |
| https://github.com/openclaw/openclaw/commit/4d912… | patch |
| https://www.vulncheck.com/advisories/openclaw-env… | third-party-advisory |
Impacted products
Date Public ?
2026-03-31 00:00
Credits
AntAISecurityLab
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-41330",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-21T13:39:14.397208Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-21T13:39:27.598Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageURL": "pkg:npm/openclaw",
"product": "OpenClaw",
"vendor": "OpenClaw",
"versions": [
{
"lessThan": "2026.3.31",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2026.3.31",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "2026.3.31",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "AntAISecurityLab"
}
],
"datePublic": "2026-03-31T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, Docker restrictions, and Git TLS enforcement."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 2,
"baseSeverity": "LOW",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-453",
"description": "CWE-453: Insecure Default Variable Initialization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-20T23:08:16.941Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "GitHub Security Advisory (GHSA-9gp8-hjxr-6f34)",
"tags": [
"vendor-advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9gp8-hjxr-6f34"
},
{
"name": "Patch Commit",
"tags": [
"patch"
],
"url": "https://github.com/openclaw/openclaw/commit/4d912e04519b4bd53b248437c53748cdebce9a41"
},
{
"name": "VulnCheck Advisory: OpenClaw \u003c 2026.3.31 - Environment Variable Override via Host Exec Policy",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-environment-variable-override-via-host-exec-policy"
}
],
"tags": [
"x_open-source"
],
"title": "OpenClaw \u003c 2026.3.31 - Environment Variable Override via Host Exec Policy",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2026-41330",
"datePublished": "2026-04-20T23:08:16.941Z",
"dateReserved": "2026-04-20T14:03:06.199Z",
"dateUpdated": "2026-04-21T13:39:27.598Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-41330",
"date": "2026-05-21",
"epss": "0.00013",
"percentile": "0.01875"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-41330\",\"sourceIdentifier\":\"disclosure@vulncheck.com\",\"published\":\"2026-04-21T00:16:31.557\",\"lastModified\":\"2026-04-27T15:08:32.360\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, Docker restrictions, and Git TLS enforcement.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":2.0,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-453\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"2026.3.31\",\"matchCriteriaId\":\"35B1FB5C-EA5A-4095-9226-F947A9B3B984\"}]}]}],\"references\":[{\"url\":\"https://github.com/openclaw/openclaw/commit/4d912e04519b4bd53b248437c53748cdebce9a41\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openclaw/openclaw/security/advisories/GHSA-9gp8-hjxr-6f34\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.vulncheck.com/advisories/openclaw-environment-variable-override-via-host-exec-policy\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-41330\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-21T13:39:14.397208Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-21T13:39:21.001Z\"}}], \"cna\": {\"tags\": [\"x_open-source\"], \"title\": \"OpenClaw \u003c 2026.3.31 - Environment Variable Override via Host Exec Policy\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"AntAISecurityLab\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 2, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"LOW\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"OpenClaw\", \"product\": \"OpenClaw\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2026.3.31\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"2026.3.31\", \"versionType\": \"semver\"}], \"packageURL\": \"pkg:npm/openclaw\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-03-31T00:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/openclaw/openclaw/security/advisories/GHSA-9gp8-hjxr-6f34\", \"name\": \"GitHub Security Advisory (GHSA-9gp8-hjxr-6f34)\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/openclaw/openclaw/commit/4d912e04519b4bd53b248437c53748cdebce9a41\", \"name\": \"Patch Commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://www.vulncheck.com/advisories/openclaw-environment-variable-override-via-host-exec-policy\", \"name\": \"VulnCheck Advisory: OpenClaw \u003c 2026.3.31 - Environment Variable Override via Host Exec Policy\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"vulncheck\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, Docker restrictions, and Git TLS enforcement.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-453\", \"description\": \"CWE-453: Insecure Default Variable Initialization\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"2026.3.31\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"shortName\": \"VulnCheck\", \"dateUpdated\": \"2026-04-20T23:08:16.941Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-41330\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-21T13:39:27.598Z\", \"dateReserved\": \"2026-04-20T14:03:06.199Z\", \"assignerOrgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"datePublished\": \"2026-04-20T23:08:16.941Z\", \"assignerShortName\": \"VulnCheck\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-41330
Vulnerability from fkie_nvd - Published: 2026-04-21 00:16 - Updated: 2026-04-27 15:08
Severity ?
Summary
OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, Docker restrictions, and Git TLS enforcement.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "35B1FB5C-EA5A-4095-9226-F947A9B3B984",
"versionEndExcluding": "2026.3.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, Docker restrictions, and Git TLS enforcement."
}
],
"id": "CVE-2026-41330",
"lastModified": "2026-04-27T15:08:32.360",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5,
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.0,
"baseSeverity": "LOW",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-04-21T00:16:31.557",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Patch"
],
"url": "https://github.com/openclaw/openclaw/commit/4d912e04519b4bd53b248437c53748cdebce9a41"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9gp8-hjxr-6f34"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-environment-variable-override-via-host-exec-policy"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-453"
}
],
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
]
}
GHSA-9GP8-HJXR-6F34
Vulnerability from github – Published: 2026-04-03 02:57 – Updated: 2026-04-24 21:04
VLAI?
Summary
OpenClaw: Host exec environment overrides miss proxy, TLS, Docker, and Git TLS controls
Details
Summary
Host exec environment overrides miss proxy, TLS, Docker, and Git TLS controls
Current Maintainer Triage
- Status: open
- Normalized severity: medium
- Assessment: Real in shipped v2026.3.28: host exec env policy still missed proxy, TLS, Docker, and Git TLS variables until 4d912e0451 on 2026-03-31; maintainers already accepted it and the fix is unreleased.
Affected Packages / Versions
- Package:
openclaw(npm) - Latest published npm version:
2026.3.31 - Vulnerable version range:
<=2026.3.28 - Patched versions:
>= 2026.3.31 - First stable tag containing the fix:
v2026.3.31
Fix Commit(s)
4d912e04519b4bd53b248437c53748cdebce9a41— 2026-03-31T21:25:36+09:00
OpenClaw thanks @AntAISecurityLab for reporting.
Severity ?
4.4 (Medium)
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2026.3.28"
},
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.3.31"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-41330"
],
"database_specific": {
"cwe_ids": [
"CWE-269",
"CWE-453"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-03T02:57:00Z",
"nvd_published_at": "2026-04-21T00:16:31Z",
"severity": "MODERATE"
},
"details": "## Summary\nHost exec environment overrides miss proxy, TLS, Docker, and Git TLS controls\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: Real in shipped v2026.3.28: host exec env policy still missed proxy, TLS, Docker, and Git TLS variables until 4d912e0451 on 2026-03-31; maintainers already accepted it and the fix is unreleased.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `2026.3.31`\n- Vulnerable version range: `\u003c=2026.3.28`\n- Patched versions: `\u003e= 2026.3.31`\n- First stable tag containing the fix: `v2026.3.31`\n\n## Fix Commit(s)\n- `4d912e04519b4bd53b248437c53748cdebce9a41` \u2014 2026-03-31T21:25:36+09:00\n\nOpenClaw thanks @AntAISecurityLab for reporting.",
"id": "GHSA-9gp8-hjxr-6f34",
"modified": "2026-04-24T21:04:54Z",
"published": "2026-04-03T02:57:00Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9gp8-hjxr-6f34"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41330"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/4d912e04519b4bd53b248437c53748cdebce9a41"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.3.31"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-environment-variable-override-via-host-exec-policy"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenClaw: Host exec environment overrides miss proxy, TLS, Docker, and Git TLS controls"
}
WID-SEC-W-2026-0948
Vulnerability from csaf_certbund - Published: 2026-03-31 22:00 - Updated: 2026-04-28 22:00Summary
OpenClaw: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: OpenClaw ist ein persönlicher KI-Assistent zur Ausführung auf eigenen Geräten.
Angriff: Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um erweiterte Privilegien zu erlangen, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, Daten offenzulegen oder zu manipulieren oder andere, nicht näher spezifizierte Angriffe durchzuführen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
References
55 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenClaw ist ein pers\u00f6nlicher KI-Assistent zur Ausf\u00fchrung auf eigenen Ger\u00e4ten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um erweiterte Privilegien zu erlangen, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten offenzulegen oder zu manipulieren oder andere, nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0948 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0948.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0948 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0948"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-3q42-xmxv-9vfr vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3q42-xmxv-9vfr"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-3qpv-xf3v-mm45 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3qpv-xf3v-mm45"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-3xv9-89fm-7h4r vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3xv9-89fm-7h4r"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-42mx-vp8m-j7qh vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-42mx-vp8m-j7qh"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-4g5x-2jfc-xm98 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4g5x-2jfc-xm98"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-57gh-m6rq-54cf vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-57gh-m6rq-54cf"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-58q2-7r52-jq62 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-58q2-7r52-jq62"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-6336-qqw9-v6x6 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-6336-qqw9-v6x6"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-68v4-hmwv-f43h vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-68v4-hmwv-f43h"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-6p8r-6m93-557f vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-6p8r-6m93-557f"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-767m-xrhc-fxm7 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-767m-xrhc-fxm7"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-7ggg-pvrf-458v vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7ggg-pvrf-458v"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-877v-w3f5-3pcq vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-877v-w3f5-3pcq"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-89r3-6x4j-v7wf vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-89r3-6x4j-v7wf"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-9f4w-67g7-mqwv vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9f4w-67g7-mqwv"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-9gp8-hjxr-6f34 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9gp8-hjxr-6f34"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-9p3r-hh9g-5cmg vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-9q7v-8mr7-g23p vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9q7v-8mr7-g23p"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-cg7q-fg22-4g98 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cg7q-fg22-4g98"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-chfm-xgc4-47rj vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-chfm-xgc4-47rj"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-cqgw-44wg-44rf vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cqgw-44wg-44rf"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-cwf8-44x6-32c2 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cwf8-44x6-32c2"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-cwq8-6f96-g3q4 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cwq8-6f96-g3q4"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-f693-58pc-2gfr vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f693-58pc-2gfr"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-f6pf-4gjx-c94r vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f6pf-4gjx-c94r"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-fv94-qvg8-xqpw vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fv94-qvg8-xqpw"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-fwjq-xwfj-gv75 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fwjq-xwfj-gv75"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-g374-mggx-p6xc vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g374-mggx-p6xc"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-g5cg-8x5w-7jpm vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g5cg-8x5w-7jpm"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-g8xp-qx39-9jq9 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g8xp-qx39-9jq9"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-gg9v-mgcp-v6m7 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gg9v-mgcp-v6m7"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-gjm7-hw8f-73rq vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gjm7-hw8f-73rq"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-h2v7-xc88-xx8c vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h2v7-xc88-xx8c"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-h5hg-h7rr-gpf3 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h5hg-h7rr-gpf3"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-hhff-fj5f-qg48 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hhff-fj5f-qg48"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-hhq4-97c2-p447 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hhq4-97c2-p447"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-hr8g-2q7x-3f4w vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hr8g-2q7x-3f4w"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-j9pv-rrcj-6pfx vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-j9pv-rrcj-6pfx"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-jjw7-3vjf-fg5j vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jjw7-3vjf-fg5j"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-m6fx-m8hc-572m vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-m6fx-m8hc-572m"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-mhgq-xpfq-6r66 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mhgq-xpfq-6r66"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-mhr7-2xmv-4c4q vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mhr7-2xmv-4c4q"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-p464-m8x6-vhv8 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-p464-m8x6-vhv8"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-q9w8-cf67-r238 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-q9w8-cf67-r238"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-qcc3-jqwp-5vh2 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qcc3-jqwp-5vh2"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-qcj9-wwgw-6gm8 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qcj9-wwgw-6gm8"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-rfqg-qgf8-xr9x vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rfqg-qgf8-xr9x"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-rg8m-3943-vm6q vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rg8m-3943-vm6q"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-rm5c-4rmf-vvhw vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rm5c-4rmf-vvhw"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-v3qc-wrwx-j3pw vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v3qc-wrwx-j3pw"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-vjx8-8p7h-82gr vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vjx8-8p7h-82gr"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-w85g-3h6x-4xh2 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w85g-3h6x-4xh2"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-x2m8-53h4-6hch vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x2m8-53h4-6hch"
}
],
"source_lang": "en-US",
"title": "OpenClaw: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-28T22:00:00.000+00:00",
"generator": {
"date": "2026-04-29T04:49:15.427+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0948",
"initial_release_date": "2026-03-31T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-20T22:00:00.000+00:00",
"number": "2",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-04-23T22:00:00.000+00:00",
"number": "3",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2026-04-27T22:00:00.000+00:00",
"number": "4",
"summary": "Referenzen erg\u00e4nzt"
},
{
"date": "2026-04-28T22:00:00.000+00:00",
"number": "5",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2026.3.31",
"product": {
"name": "Open Source OpenClaw \u003c2026.3.31",
"product_id": "T052351"
}
},
{
"category": "product_version",
"name": "2026.3.31",
"product": {
"name": "Open Source OpenClaw 2026.3.31",
"product_id": "T052351-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openclaw:openclaw:2026.3.31"
}
}
}
],
"category": "product_name",
"name": "OpenClaw"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41296",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41296"
},
{
"cve": "CVE-2026-41297",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41297"
},
{
"cve": "CVE-2026-41300",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41300"
},
{
"cve": "CVE-2026-41302",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41302"
},
{
"cve": "CVE-2026-41329",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41329"
},
{
"cve": "CVE-2026-41330",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41330"
},
{
"cve": "CVE-2026-41331",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41331"
},
{
"cve": "CVE-2026-41333",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41333"
},
{
"cve": "CVE-2026-41334",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41334"
},
{
"cve": "CVE-2026-41335",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41335"
},
{
"cve": "CVE-2026-41336",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41336"
},
{
"cve": "CVE-2026-41337",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41337"
},
{
"cve": "CVE-2026-41338",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41338"
},
{
"cve": "CVE-2026-41340",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41340"
},
{
"cve": "CVE-2026-41341",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41341"
},
{
"cve": "CVE-2026-41343",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41343"
},
{
"cve": "CVE-2026-41345",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41345"
},
{
"cve": "CVE-2026-41347",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41347"
},
{
"cve": "CVE-2026-41349",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41349"
},
{
"cve": "CVE-2026-41350",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41350"
},
{
"cve": "CVE-2026-41353",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41353"
},
{
"cve": "CVE-2026-41355",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41355"
},
{
"cve": "CVE-2026-41356",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41356"
},
{
"cve": "CVE-2026-41357",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41357"
},
{
"cve": "CVE-2026-41359",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41359"
},
{
"cve": "CVE-2026-41364",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41364"
},
{
"cve": "CVE-2026-41365",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41365"
},
{
"cve": "CVE-2026-41366",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41366"
},
{
"cve": "CVE-2026-41369",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41369"
},
{
"cve": "CVE-2026-41370",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41370"
},
{
"cve": "CVE-2026-41373",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41373"
},
{
"cve": "CVE-2026-41374",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41374"
},
{
"cve": "CVE-2026-41375",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41375"
},
{
"cve": "CVE-2026-41376",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41376"
},
{
"cve": "CVE-2026-41377",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41377"
},
{
"cve": "CVE-2026-41378",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41378"
},
{
"cve": "CVE-2026-41379",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41379"
},
{
"cve": "CVE-2026-41381",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41381"
},
{
"cve": "CVE-2026-41382",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41382"
},
{
"cve": "CVE-2026-41385",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41385"
},
{
"cve": "CVE-2026-41386",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41386"
},
{
"cve": "CVE-2026-41391",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41391"
},
{
"cve": "CVE-2026-41393",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41393"
},
{
"cve": "CVE-2026-41394",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41394"
},
{
"cve": "CVE-2026-41396",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41396"
},
{
"cve": "CVE-2026-41397",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41397"
},
{
"cve": "CVE-2026-41402",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41402"
},
{
"cve": "CVE-2026-41403",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41403"
},
{
"cve": "CVE-2026-41404",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41404"
},
{
"cve": "CVE-2026-41405",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41405"
},
{
"cve": "CVE-2026-41406",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41406"
},
{
"cve": "CVE-2026-41408",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41408"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…