Malware is evolving to evade sandboxes by pretending to be a real human behind the keyboard. The Picus Red Report 2026 shows 80% of top attacker techniques now focus on evasion and persistence, including geometry-based cursor tests and CPU timing checks. [...]
A vulnerability, which was classified as critical, has been found in OpenClaw up to 2026.2.1. Affected by this vulnerability is an unknown functionality of the component Gateway WebSocket Connect Handshake. Performing a manipulation results in missing authentication.
This vulnerability is identified as CVE-2026-28472. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in OpenClaw up to 2026.2.13 and classified as critical. This affects an unknown part. The manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-28469. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in OpenClaw up to 2026.2.12. It has been rated as problematic. The affected element is an unknown function of the component Webhook Handler. Performing a manipulation results in allocation of resources.
This vulnerability is reported as CVE-2026-28478. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability described as problematic has been identified in OpenClaw up to 2026.2.1. Affected by this vulnerability is an unknown functionality of the file /approve of the component RPC Call Handler. Such manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2026-28473. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability classified as problematic was found in OpenClaw up to 2026.1.30. This affects an unknown part of the component Bearer Token Handler. Executing a manipulation can lead to insertion of sensitive information into sent data.
The identification of this vulnerability is CVE-2026-28481. The attack may be launched remotely. There is no exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability, which was classified as critical, was found in OpenClaw up to 2026.2.11. This issue affects some unknown processing of the file /agent/act. The manipulation results in missing authentication.
This vulnerability is identified as CVE-2026-28485. The attack is only possible with local access. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in OpenClaw up to 2026.2.13. It has been rated as critical. This impacts an unknown function. The manipulation leads to authentication bypass by spoofing.
This vulnerability is documented as CVE-2026-28480. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as problematic has been discovered in OpenClaw up to 2026.2.14. Affected is an unknown function of the component Configuration Handler. The manipulation results in risky cryptographic algorithm.
This vulnerability is reported as CVE-2026-28479. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in OpenClaw up to 2026.2.1. This vulnerability affects unknown code. Executing a manipulation can lead to argument injection.
This vulnerability is handled as CVE-2026-28470. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in OpenClaw up to 2026.2.11. The affected element is an unknown function. This manipulation of the argument sessionId causes path traversal.
The identification of this vulnerability is CVE-2026-28482. The attack can only be executed locally. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in OpenClaw up to 2026.2.5. The impacted element is an unknown function of the component nextcloud-talk. Such manipulation leads to incorrect authorization.
This vulnerability is referenced as CVE-2026-28474. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.