Skip to content

Instantly share code, notes, and snippets.

View alon710's full-sized avatar
💪

Alon Barad alon710

💪
View GitHub Profile
@alon710
alon710 / GHSA-7H7G-X2PX-94HJ.md
Created March 14, 2026 13:40
GHSA-7H7G-X2PX-94HJ: GHSA-7H7G-X2PX-94HJ: Credential Exposure in OpenClaw Device Pairing - CVE Security Report

GHSA-7H7G-X2PX-94HJ: GHSA-7H7G-X2PX-94HJ: Credential Exposure in OpenClaw Device Pairing

CVSS Score: 5.3 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-7H7G-X2PX-94HJ

Summary

The OpenClaw personal AI assistant ecosystem suffers from an insufficiently protected credentials vulnerability (CWE-522) during the device pairing process. The Gateway generates setup codes that embed permanent, shared authentication tokens rather than ephemeral bootstrap keys. Interception of these codes grants an attacker persistent access to the user's Gateway, exposing integrated AI service API keys, chat histories, and agent configurations. The vulnerability is resolved in version v2026.3.12 through the implementation of short-lived, per-device session credentials.

TL;DR

@alon710
alon710 / GHSA-VMHQ-CQM9-6P7Q.md
Created March 14, 2026 11:10
GHSA-VMHQ-CQM9-6P7Q: GHSA-VMHQ-CQM9-6P7Q: Privilege Escalation via Incorrect Authorization in OpenClaw Gateway - CVE Security Report

GHSA-VMHQ-CQM9-6P7Q: GHSA-VMHQ-CQM9-6P7Q: Privilege Escalation via Incorrect Authorization in OpenClaw Gateway

CVSS Score: 7.1 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-VMHQ-CQM9-6P7Q

Summary

A high-severity authorization bypass vulnerability exists in the OpenClaw AI assistant platform. It permits users with write-scoped permissions to interact with restricted administrative endpoints. This flaw enables attackers to modify or delete persistent browser profiles, hijacking browser infrastructure via malicious Chrome DevTools Protocol (CDP) URLs.

TL;DR

@alon710
alon710 / GHSA-M69H-JM2F-2PV8.md
Created March 14, 2026 10:40
GHSA-M69H-JM2F-2PV8: GHSA-m69h-jm2f-2pv8: Authorization Bypass via Insecure Event Resolution in OpenClaw Feishu Extension - CVE Security Report

GHSA-M69H-JM2F-2PV8: GHSA-m69h-jm2f-2pv8: Authorization Bypass via Insecure Event Resolution in OpenClaw Feishu Extension

CVSS Score: Moderate Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-M69H-JM2F-2PV8

Summary

An authorization bypass vulnerability exists in the Feishu extension of the OpenClaw AI assistant framework. By exploiting an insecure default in the reaction event processing logic, attackers can trigger bot actions in restricted group contexts, bypassing mention gating and group authorization controls.

TL;DR

@alon710
alon710 / GHSA-F8R2-VG7X-GH8M.md
Created March 14, 2026 09:40
GHSA-F8R2-VG7X-GH8M: GHSA-f8r2-vg7x-gh8m: Path Overmatching and Command Execution Bypass in OpenClaw - CVE Security Report

GHSA-F8R2-VG7X-GH8M: GHSA-f8r2-vg7x-gh8m: Path Overmatching and Command Execution Bypass in OpenClaw

CVSS Score: 5.3 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-F8R2-VG7X-GH8M

Summary

OpenClaw versions up to 2026.3.8 suffer from an improper input validation vulnerability in the command execution allowlist mechanism. Flawed pattern matching logic, including improper lowercasing on POSIX systems and broad glob wildcard handling, allows an attacker to bypass execution restrictions and invoke unauthorized commands.

TL;DR

@alon710
alon710 / GHSA-R7VR-GR74-94P8.md
Created March 14, 2026 07:40
GHSA-R7VR-GR74-94P8: GHSA-r7vr-gr74-94p8: Improper Authorization and Privilege Escalation in OpenClaw - CVE Security Report

GHSA-R7VR-GR74-94P8: GHSA-r7vr-gr74-94p8: Improper Authorization and Privilege Escalation in OpenClaw

CVSS Score: 8.8 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-R7VR-GR74-94P8

Summary

OpenClaw versions prior to v2026.3.12 contain an improper authorization vulnerability in the command dispatcher logic. A missing ownership validation check allows any user on the general allowlist to execute highly sensitive administrative commands. This flaw exposes the bot configuration and debug surfaces, leading to potential information disclosure and service disruption.

TL;DR

@alon710
alon710 / GHSA-99QW-6MR3-36QR.md
Created March 14, 2026 07:10
GHSA-99QW-6MR3-36QR: GHSA-99QW-6MR3-36QR: Remote Code Execution via Malicious Workspace Plugins in OpenClaw - CVE Security Report

GHSA-99QW-6MR3-36QR: GHSA-99QW-6MR3-36QR: Remote Code Execution via Malicious Workspace Plugins in OpenClaw

CVSS Score: 9.6 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-99QW-6MR3-36QR

Summary

OpenClaw, an open-source AI agent platform, contains a critical vulnerability in its plugin auto-discovery mechanism. The platform implicitly trusts and executes code located within the .openclaw/extensions/ directory of any opened workspace. This behavior allows an attacker to achieve arbitrary code execution by convincing a user to clone and open a maliciously crafted repository.

TL;DR

@alon710
alon710 / GHSA-WCXR-59V9-RXR8.md
Created March 14, 2026 06:40
GHSA-WCXR-59V9-RXR8: GHSA-WCXR-59V9-RXR8: Sandbox Escape via Improper Authorization in OpenClaw session_status Tool - CVE Security Report

GHSA-WCXR-59V9-RXR8: GHSA-WCXR-59V9-RXR8: Sandbox Escape via Improper Authorization in OpenClaw session_status Tool

CVSS Score: 9.9 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-WCXR-59V9-RXR8

Summary

The OpenClaw session_status tool fails to properly validate authorization boundaries when processing the sessionKey parameter. This flaw allows restricted sandboxed subagents to read or influence the state of higher-privileged parent sessions, resulting in a critical sandbox escape.

TL;DR

@alon710
alon710 / GHSA-RQPP-RJJ8-7WV8.md
Created March 14, 2026 05:40
GHSA-RQPP-RJJ8-7WV8: GHSA-RQPP-RJJ8-7WV8: Privilege Escalation via Logic Flaw in OpenClaw WebSocket Authentication - CVE Security Report

GHSA-RQPP-RJJ8-7WV8: GHSA-RQPP-RJJ8-7WV8: Privilege Escalation via Logic Flaw in OpenClaw WebSocket Authentication

CVSS Score: 9.9 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-RQPP-RJJ8-7WV8

Summary

A critical logic flaw in the OpenClaw gateway's WebSocket authentication mechanism allows remote attackers authenticated via shared secrets to arbitrarily elevate their authorization scopes to administrative levels.

TL;DR

@alon710
alon710 / GHSA-2RQG-GJGV-84JM.md
Created March 14, 2026 05:10
GHSA-2RQG-GJGV-84JM: GHSA-2rqg-gjgv-84jm: Workspace Boundary Bypass and Sandbox Escape in OpenClaw - CVE Security Report

GHSA-2RQG-GJGV-84JM: GHSA-2rqg-gjgv-84jm: Workspace Boundary Bypass and Sandbox Escape in OpenClaw

CVSS Score: 8.5 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-2RQG-GJGV-84JM

Summary

A critical vulnerability in the OpenClaw gateway architecture allows subagents to bypass workspace sandboxes by manipulating RPC parameters. By supplying arbitrary paths during agent spawning, attackers can escape the designated execution directory and achieve arbitrary file read and write on the host filesystem.

TL;DR

@alon710
alon710 / GHSA-G353-MGV3-8PCJ.md
Created March 14, 2026 04:40
GHSA-G353-MGV3-8PCJ: GHSA-G353-MGV3-8PCJ: Authentication Bypass via Forged Webhook Events in OpenClaw Feishu Integration - CVE Security Report

GHSA-G353-MGV3-8PCJ: GHSA-G353-MGV3-8PCJ: Authentication Bypass via Forged Webhook Events in OpenClaw Feishu Integration

CVSS Score: 8.6 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-G353-MGV3-8PCJ

Summary

OpenClaw versions prior to 2026.3.12 contain a high-severity authentication bypass vulnerability in the Feishu channel integration. When configured in webhook mode without an encryption key, the system relies solely on a static plaintext token, allowing unauthenticated remote attackers to inject forged events and execute unauthorized actions.

TL;DR