Aggregator
CVE-2026-28472 | OpenClaw up to 2026.2.1 Gateway WebSocket Connect Handshake missing authentication (GHSA-rv39-79c4-7459)
1 month 3 weeks ago
A vulnerability, which was classified as critical, has been found in OpenClaw up to 2026.2.1. Affected by this vulnerability is an unknown functionality of the component Gateway WebSocket Connect Handshake. Performing a manipulation results in missing authentication.
This vulnerability is identified as CVE-2026-28472. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28469 | OpenClaw up to 2026.2.13 authorization (GHSA-rq6g-px6m-c248)
1 month 3 weeks ago
A vulnerability has been found in OpenClaw up to 2026.2.13 and classified as critical. This affects an unknown part. The manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-28469. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
vuldb.com
CVE-2026-28478 | OpenClaw up to 2026.2.12 Webhook allocation of resources (GHSA-q447-rj3r-2cgh)
1 month 3 weeks ago
A vulnerability was found in OpenClaw up to 2026.2.12. It has been rated as problematic. The affected element is an unknown function of the component Webhook Handler. Performing a manipulation results in allocation of resources.
This vulnerability is reported as CVE-2026-28478. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-28473 | OpenClaw up to 2026.2.1 RPC Call /approve authorization (GHSA-mqpw-46fh-299h)
1 month 3 weeks ago
A vulnerability described as problematic has been identified in OpenClaw up to 2026.2.1. Affected by this vulnerability is an unknown functionality of the file /approve of the component RPC Call Handler. Such manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2026-28473. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-28481 | OpenClaw up to 2026.1.30 Bearer Token insertion of sensitive information into sent data (GHSA-7vwx-582j-j332)
1 month 3 weeks ago
A vulnerability classified as problematic was found in OpenClaw up to 2026.1.30. This affects an unknown part of the component Bearer Token Handler. Executing a manipulation can lead to insertion of sensitive information into sent data.
The identification of this vulnerability is CVE-2026-28481. The attack may be launched remotely. There is no exploit available.
Applying a patch is advised to resolve this issue.
vuldb.com
CVE-2026-28485 | OpenClaw up to 2026.2.11 /agent/act missing authentication (GHSA-qpjj-47vm-64pj)
1 month 3 weeks ago
A vulnerability, which was classified as critical, was found in OpenClaw up to 2026.2.11. This issue affects some unknown processing of the file /agent/act. The manipulation results in missing authentication.
This vulnerability is identified as CVE-2026-28485. The attack is only possible with local access. There is not any exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2026-28480 | OpenClaw up to 2026.2.13 authentication spoofing (GHSA-mj5r-hh7j-4gxf)
1 month 3 weeks ago
A vulnerability was found in OpenClaw up to 2026.2.13. It has been rated as critical. This impacts an unknown function. The manipulation leads to authentication bypass by spoofing.
This vulnerability is documented as CVE-2026-28480. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-28479 | OpenClaw up to 2026.2.14 Configuration risky encryption (GHSA-fh3f-q9qw-93j9)
1 month 3 weeks ago
A vulnerability categorized as problematic has been discovered in OpenClaw up to 2026.2.14. Affected is an unknown function of the component Configuration Handler. The manipulation results in risky cryptographic algorithm.
This vulnerability is reported as CVE-2026-28479. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28470 | OpenClaw up to 2026.2.1 argument injection (GHSA-3hcm-ggvf-rch5)
1 month 3 weeks ago
A vulnerability described as critical has been identified in OpenClaw up to 2026.2.1. This vulnerability affects unknown code. Executing a manipulation can lead to argument injection.
This vulnerability is handled as CVE-2026-28470. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-28482 | OpenClaw up to 2026.2.11 sessionId path traversal (GHSA-5xfq-5mr7-426q)
1 month 3 weeks ago
A vulnerability, which was classified as critical, has been found in OpenClaw up to 2026.2.11. The affected element is an unknown function. This manipulation of the argument sessionId causes path traversal.
The identification of this vulnerability is CVE-2026-28482. The attack can only be executed locally. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28474 | OpenClaw up to 2026.2.5 nextcloud-talk authorization (GHSA-r5h9-vjqc-hq3r)
1 month 3 weeks ago
A vulnerability, which was classified as critical, was found in OpenClaw up to 2026.2.5. The impacted element is an unknown function of the component nextcloud-talk. Such manipulation leads to incorrect authorization.
This vulnerability is referenced as CVE-2026-28474. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2026-28476 | OpenClaw up to 2026.2.13 server-side request forgery (GHSA-pg2v-8xwh-qhcc)
1 month 3 weeks ago
A vulnerability was found in OpenClaw up to 2026.2.13. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation results in server-side request forgery.
This vulnerability is cataloged as CVE-2026-28476. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-28477 | OpenClaw up to 2026.2.13 OAuth Call cross-site request forgery (GHSA-7rcp-mxpq-72pj)
1 month 3 weeks ago
A vulnerability categorized as problematic has been discovered in OpenClaw up to 2026.2.13. This affects an unknown part of the component OAuth Call Handler. Such manipulation leads to cross-site request forgery.
This vulnerability is documented as CVE-2026-28477. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28471 | OpenClaw up to 2026.2.1 Matrix Plugin improper authentication (GHSA-rmxw-jxxx-4cpc)
1 month 3 weeks ago
A vulnerability identified as critical has been detected in OpenClaw up to 2026.2.1. This vulnerability affects unknown code of the component Matrix Plugin. Performing a manipulation results in improper authentication.
This vulnerability is reported as CVE-2026-28471. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
vuldb.com
CVE-2026-29606 | OpenClaw up to 2026.2.13 Publicly Reachable Webhook Endpoint missing authentication (GHSA-c37p-4qqg-3p76)
1 month 3 weeks ago
A vulnerability identified as critical has been detected in OpenClaw up to 2026.2.13. Affected by this vulnerability is an unknown functionality of the component Publicly Reachable Webhook Endpoint. This manipulation causes missing authentication.
This vulnerability appears as CVE-2026-29606. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
vuldb.com
CISA shortens patch deadline for critical Ivanti, SolarWinds bugs
1 month 3 weeks ago
The Cybersecurity and Infrastructure Security Agency (CISA) gave all federal civilian agencies until Thursday to patch CVE-2025-26399 — a critical vulnerability impacting the popular SolarWinds Web Help Desk.
CVE-2025-11739 | Schneider Electric EcoStruxure Power Monitoring Expert 2022/2023/2024 deserialization (SEVD-2026-069-06)
1 month 3 weeks ago
A vulnerability described as critical has been identified in Schneider Electric EcoStruxure Power Monitoring Expert and EcoStruxure Power Operation Advanced Reporting and Dashboards Module 2022/2023/2024. This affects an unknown part. The manipulation results in deserialization.
This vulnerability is identified as CVE-2025-11739. The attack is only possible with local access. There is not any exploit available.
It is advisable to implement a patch to correct this issue.
vuldb.com
CVE-2026-2741 | Vaadin Flow up to 14.14.0/23.6.6/24.9.8/25.0.2 ZIP Node.js path traversal
1 month 3 weeks ago
A vulnerability marked as critical has been reported in Vaadin Flow up to 14.14.0/23.6.6/24.9.8/25.0.2. Affected by this issue is some unknown functionality of the file Node.js of the component ZIP Handler. The manipulation leads to path traversal.
This vulnerability is referenced as CVE-2026-2741. The attack can only be performed from a local environment. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-2742 | Vaadin Flow up to 14.14.0/23.6.6/24.9.7/25.0.1 Endpoint /vaadin access control
1 month 3 weeks ago
A vulnerability labeled as critical has been found in Vaadin Flow up to 14.14.0/23.6.6/24.9.7/25.0.1. Affected by this vulnerability is an unknown functionality of the file /vaadin of the component Endpoint. Executing a manipulation can lead to improper access controls.
The identification of this vulnerability is CVE-2026-2742. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
vuldb.com