Maxime Grenu
20 exploits
Active since Apr 2026
OpenClaw < 2026.4.8 - Missing Owner-Only Enforcement in /allowlist Cross-Channel Writes
CVSS 4.3
OpenClaw < 2026.4.8 - Workspace-Only Filesystem Policy Bypass via docx upload_file/upload_image
CVSS 6.5
OpenClaw < 2026.4.8 - Server-Side Request Forgery Policy Bypass via Interaction-Triggered Navigation
CVSS 7.6
OpenClaw < 2026.4.4 - Rate-Limit Bypass via Concurrent Async Authentication Attempts
CVSS 3.7
OpenClaw < 2026.4.8 - Server-Side Request Forgery in QQ Bot Media Fetch Paths
CVSS 8.5
OpenClaw < 2026.4.8 - Git Environment Variable Injection via Unfiltered Exec Environment
CVSS 5.3
OpenClaw < 2026.4.8 - Stale Authentication State via Config Reload
CVSS 5.4
OpenClaw < 2026.4.8 - Improper Base64 Decoding Size Validation
CVSS 4.3
OpenClaw < 2026.4.8 - WebSocket Session Persistence via Shared Gateway Token Rotation
CVSS 5.4
OpenClaw < 2026.4.8 - Role Bypass in device.token.rotate Function
CVSS 8.8
OpenClaw < 2026.4.8 - strictInlineEval Approval Boundary Bypass via Approval-Timeout Fallback
CVSS 7.5
OpenClaw < 2026.4.8 - Local File Exfiltration via Shared Reply MEDIA Paths
CVSS 5.7
OpenClaw < 2026.4.8 - Improper Authorization in node.pair.approve via operator.write Scope
CVSS 8.8
OpenClaw < 2026.4.8 - Remote Code Execution via Build Tool Environment Variable Injection
CVSS 5.3
OpenClaw < 2026.4.8 - Missing Integrity Verification in Package Downloads
CVSS 7.1
OpenClaw < 2026.4.8 - Privilege Escalation via Gateway Plugin HTTP Authentication
CVSS 7.1
OpenClaw < 2026.4.8 - Strict Browser SSRF Bypass via Playwright Redirect Handling
CVSS 6.5
OpenClaw < 2026.4.8 - Persistent Profile Mutation via node.invoke(browser.proxy) Bypass
CVSS 8.1
OpenClaw < 2026.4.8 - Command Escalation via Node Pairing Reconnect Bypass
CVSS 7.8
OpenClaw < 2026.3.31 - Unsafe Request Body Replay via fetchWithSsrFGuard Cross-Origin Redirects
CVSS 6.5