Jacob Tomlinson
59 exploits
Active since Jan 2026
OpenClaw < 2026.3.31 - Unsanitized Environment Variable Leakage in SSH Sandbox Backends
CVSS 3.3
OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context
CVSS 5.4
OpenClaw < 2026.4.2 - Approval Integrity Bypass in pnpm dlx Local Script Binding
CVSS 6.7
OpenClaw < 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect
CVSS 7.6
OpenClaw < 2026.4.2 - Authorization Bypass in Session Termination Endpoint
CVSS 5.4
OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Preservation in Remote Onboarding
CVSS 6.5
OpenClaw < 2026.3.31 - Server-Side Request Forgery via Unguarded fetch() in Marketplace Plugin Download
CVSS 7.6
OpenClaw < 2026.3.25 - Direct Message Policy Bypass via Verification Notices
CVSS 5.3
OpenClaw 2026.2.13 < 2026.3.25 - ANSI Escape Sequence Injection in Approval Prompt
CVSS 4.3
OpenClaw < 2026.3.25 - Authorization Bypass in Microsoft Teams Feedback Invoke
CVSS 5.3
OpenClaw < 2026.3.25 - Authorization Bypass in HTTP Session History Route
CVSS 6.5
OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Button Callback Authorization Bypass
CVSS 5.3
OpenClaw < 2026.3.25 - Privilege Escalation via Backend Reconnect Scope Self-Claim
CVSS 8.8
OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Card Callbacks
CVSS 5.3
OpenClaw < 2026.3.25 - Privilege Escalation via Gateway Plugin HTTP Authentication Scope
CVSS 8.8
OpenClaw < 2026.3.25 - Improper Access Control in /sessions/:sessionKey/kill Endpoint
CVSS 8.1
OpenClaw < 2026.3.25 - Authorization Bypass via Group Policy Rebinding with Mutable Space displayName
CVSS 4.2
OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Webhook Password Rate Limiting
CVSS 4.8
OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Telegram Webhook Rate Limiting
CVSS 4.8
OpenClaw < 2026.3.25 - Server-Side Request Forgery via Unguarded Configured Base URLs in Channel Extensions
CVSS 7.4
OpenClaw 2026.3.11 < 2026.3.25 - Session Isolation Bypass via sessionId Resolution
CVSS 6.5
OpenClaw < 2026.3.25 - Denial of Service via Unauthenticated Webhook Request Parsing
CVSS 5.3
OpenClaw < 2026.3.25 - Authorization Bypass in Group Reactions via requireMention Bypass
CVSS 4.3
OpenClaw < 2026.3.25 - Privilege Escalation via Synthetic operator.admin in deleteSession
CVSS 8.1
OpenClaw < 2026.3.25 - Pre-Authentication Rate-Limit Bypass in Webhook Token Validation
CVSS 4.8