A vulnerability was found in OpenClaw up to 2026.3.7. It has been rated as problematic. Affected by this vulnerability is an unknown functionality. Performing a manipulation results in time-of-check time-of-use.
This vulnerability was named CVE-2026-33574. The attack needs to be approached locally. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in OpenClaw up to 2026.3.11. It has been declared as critical. Affected is an unknown function of the file /pair. Such manipulation leads to insufficiently protected credentials.
This vulnerability is uniquely identified as CVE-2026-33575. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in OpenClaw up to 2026.3.10. It has been classified as problematic. This impacts an unknown function. This manipulation causes time-of-check time-of-use.
This vulnerability is handled as CVE-2026-32979. It is possible to launch the attack on the local host. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in OpenClaw up to 2026.3.11 and classified as critical. This affects an unknown function of the component Webhook Endpoint. The manipulation results in improper verification of cryptographic signature.
This vulnerability is known as CVE-2026-32974. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in OpenClaw up to 2026.3.10 and classified as problematic. The impacted element is an unknown function of the component session_status. The manipulation of the argument sessionKey leads to incorrect authorization.
This vulnerability is traded as CVE-2026-32918. An attack has to be approached locally. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in OpenClaw up to 2026.3.10. The affected element is an unknown function. Executing a manipulation can lead to incorrect authorization.
This vulnerability appears as CVE-2026-32915. The attack requires local access. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in OpenClaw up to 2026.2.16. Impacted is an unknown function of the component JSONL File Parser. Performing a manipulation results in creation of temporary file with insecure permissions.
This vulnerability is reported as CVE-2026-33572. The attack requires a local approach. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in OpenClaw up to 2026.3.11. This issue affects some unknown processing of the component Route Message Handler. Such manipulation leads to reliance on untrusted inputs in a security decision.
This vulnerability is documented as CVE-2026-32975. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in OpenClaw up to 2026.3.11. This vulnerability affects unknown code. This manipulation causes incorrect authorization.
This vulnerability is registered as CVE-2026-32914. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in OpenClaw up to 2026.3.12. This affects an unknown part of the file src/infra/device-bootstrap.ts. The manipulation results in authentication bypass by capture-replay.
This vulnerability is cataloged as CVE-2026-32987. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in OpenClaw up to 2026.3.12. Affected by this issue is some unknown functionality of the component JSON Parser. The manipulation leads to allocation of resources.
This vulnerability is listed as CVE-2026-32980. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in OpenClaw up to 2026.3.10. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to incorrect authorization.
This vulnerability is tracked as CVE-2026-32978. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in OpenClaw up to 2026.3.10. Affected is an unknown function. Performing a manipulation results in incorrect authorization.
This vulnerability is identified as CVE-2026-32919. The attack is only possible with local access. There is not any exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in OpenClaw up to 2026.3.10. This impacts an unknown function. Such manipulation of the argument spawnedBy/workspaceDir leads to exposure of resource.
This vulnerability is referenced as CVE-2026-33573. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in OpenClaw up to 2026.3.10. It has been rated as critical. This affects an unknown function. This manipulation causes permissive regular expression.
The identification of this vulnerability is CVE-2026-32973. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in OpenClaw up to 2026.3.10. It has been declared as problematic. The impacted element is an unknown function of the component CDP Endpoint. The manipulation results in incorrect authorization.
This vulnerability was named CVE-2026-32972. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.