Aggregator
OpenAI发布GPT-5.4大模型,具备更强推理、编码与计算机操作能力
2 weeks 3 days ago
安全客
黑客利用OpenClaw、GitHub与Bing传播恶意软件,攻击手段极具隐蔽性
2 weeks 3 days ago
安全客
CVE-2026-28472 | OpenClaw up to 2026.2.1 Gateway WebSocket Connect Handshake missing authentication (GHSA-rv39-79c4-7459)
2 weeks 3 days ago
A vulnerability, which was classified as critical, has been found in OpenClaw up to 2026.2.1. Affected by this vulnerability is an unknown functionality of the component Gateway WebSocket Connect Handshake. Performing a manipulation results in missing authentication.
This vulnerability is identified as CVE-2026-28472. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28469 | OpenClaw up to 2026.2.13 authorization (GHSA-rq6g-px6m-c248)
2 weeks 3 days ago
A vulnerability has been found in OpenClaw up to 2026.2.13 and classified as critical. This affects an unknown part. The manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-28469. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
vuldb.com
CVE-2026-28478 | OpenClaw up to 2026.2.12 Webhook allocation of resources (GHSA-q447-rj3r-2cgh)
2 weeks 3 days ago
A vulnerability was found in OpenClaw up to 2026.2.12. It has been rated as problematic. The affected element is an unknown function of the component Webhook Handler. Performing a manipulation results in allocation of resources.
This vulnerability is reported as CVE-2026-28478. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-28473 | OpenClaw up to 2026.2.1 RPC Call /approve authorization (GHSA-mqpw-46fh-299h)
2 weeks 3 days ago
A vulnerability described as problematic has been identified in OpenClaw up to 2026.2.1. Affected by this vulnerability is an unknown functionality of the file /approve of the component RPC Call Handler. Such manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2026-28473. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-28481 | OpenClaw up to 2026.1.30 Bearer Token insertion of sensitive information into sent data (GHSA-7vwx-582j-j332)
2 weeks 3 days ago
A vulnerability classified as problematic was found in OpenClaw up to 2026.1.30. This affects an unknown part of the component Bearer Token Handler. Executing a manipulation can lead to insertion of sensitive information into sent data.
The identification of this vulnerability is CVE-2026-28481. The attack may be launched remotely. There is no exploit available.
Applying a patch is advised to resolve this issue.
vuldb.com
CVE-2026-28485 | OpenClaw up to 2026.2.11 /agent/act missing authentication (GHSA-qpjj-47vm-64pj)
2 weeks 3 days ago
A vulnerability, which was classified as critical, was found in OpenClaw up to 2026.2.11. This issue affects some unknown processing of the file /agent/act. The manipulation results in missing authentication.
This vulnerability is identified as CVE-2026-28485. The attack is only possible with local access. There is not any exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2026-28480 | OpenClaw up to 2026.2.13 authentication spoofing (GHSA-mj5r-hh7j-4gxf)
2 weeks 3 days ago
A vulnerability was found in OpenClaw up to 2026.2.13. It has been rated as critical. This impacts an unknown function. The manipulation leads to authentication bypass by spoofing.
This vulnerability is documented as CVE-2026-28480. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-28479 | OpenClaw up to 2026.2.14 Configuration risky encryption (GHSA-fh3f-q9qw-93j9)
2 weeks 3 days ago
A vulnerability categorized as problematic has been discovered in OpenClaw up to 2026.2.14. Affected is an unknown function of the component Configuration Handler. The manipulation results in risky cryptographic algorithm.
This vulnerability is reported as CVE-2026-28479. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28470 | OpenClaw up to 2026.2.1 argument injection (GHSA-3hcm-ggvf-rch5)
2 weeks 3 days ago
A vulnerability described as critical has been identified in OpenClaw up to 2026.2.1. This vulnerability affects unknown code. Executing a manipulation can lead to argument injection.
This vulnerability is handled as CVE-2026-28470. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-28482 | OpenClaw up to 2026.2.11 sessionId path traversal (GHSA-5xfq-5mr7-426q)
2 weeks 3 days ago
A vulnerability, which was classified as critical, has been found in OpenClaw up to 2026.2.11. The affected element is an unknown function. This manipulation of the argument sessionId causes path traversal.
The identification of this vulnerability is CVE-2026-28482. The attack can only be executed locally. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28474 | OpenClaw up to 2026.2.5 nextcloud-talk authorization (GHSA-r5h9-vjqc-hq3r)
2 weeks 3 days ago
A vulnerability, which was classified as critical, was found in OpenClaw up to 2026.2.5. The impacted element is an unknown function of the component nextcloud-talk. Such manipulation leads to incorrect authorization.
This vulnerability is referenced as CVE-2026-28474. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2026-28476 | OpenClaw up to 2026.2.13 server-side request forgery (GHSA-pg2v-8xwh-qhcc)
2 weeks 3 days ago
A vulnerability was found in OpenClaw up to 2026.2.13. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation results in server-side request forgery.
This vulnerability is cataloged as CVE-2026-28476. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-28477 | OpenClaw up to 2026.2.13 OAuth Call cross-site request forgery (GHSA-7rcp-mxpq-72pj)
2 weeks 3 days ago
A vulnerability categorized as problematic has been discovered in OpenClaw up to 2026.2.13. This affects an unknown part of the component OAuth Call Handler. Such manipulation leads to cross-site request forgery.
This vulnerability is documented as CVE-2026-28477. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28471 | OpenClaw up to 2026.2.1 Matrix Plugin improper authentication (GHSA-rmxw-jxxx-4cpc)
2 weeks 3 days ago
A vulnerability identified as critical has been detected in OpenClaw up to 2026.2.1. This vulnerability affects unknown code of the component Matrix Plugin. Performing a manipulation results in improper authentication.
This vulnerability is reported as CVE-2026-28471. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
vuldb.com
CVE-2026-29606 | OpenClaw up to 2026.2.13 Publicly Reachable Webhook Endpoint missing authentication (GHSA-c37p-4qqg-3p76)
2 weeks 3 days ago
A vulnerability identified as critical has been detected in OpenClaw up to 2026.2.13. Affected by this vulnerability is an unknown functionality of the component Publicly Reachable Webhook Endpoint. This manipulation causes missing authentication.
This vulnerability appears as CVE-2026-29606. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
vuldb.com
CISA shortens patch deadline for critical Ivanti, SolarWinds bugs
2 weeks 3 days ago
The Cybersecurity and Infrastructure Security Agency (CISA) gave all federal civilian agencies until Thursday to patch CVE-2025-26399 — a critical vulnerability impacting the popular SolarWinds Web Help Desk.
CVE-2025-11739 | Schneider Electric EcoStruxure Power Monitoring Expert 2022/2023/2024 deserialization (SEVD-2026-069-06)
2 weeks 3 days ago
A vulnerability described as critical has been identified in Schneider Electric EcoStruxure Power Monitoring Expert and EcoStruxure Power Operation Advanced Reporting and Dashboards Module 2022/2023/2024. This affects an unknown part. The manipulation results in deserialization.
This vulnerability is identified as CVE-2025-11739. The attack is only possible with local access. There is not any exploit available.
It is advisable to implement a patch to correct this issue.
vuldb.com