Peter Steinberger
176 exploits
Active since Feb 2026
OpenClaw < 2026.3.22 - Privilege Escalation via Unbound Bootstrap Setup Codes
CVSS 9.1
OpenClaw < 2026.3.22 - allowProfiles Bypass via Profile Mutation and Runtime Selection
CVSS 8.1
OpenClaw < 2026.3.2 - Filesystem Boundary Bypass in Image Tool
CVSS 6.5
OpenClaw < 2026.3.24 - Missing Authorization in /send and /allowlist Chat Commands
CVSS 5.4
OpenClaw < 2026.3.24 - Incorrect Authorization in POST /reset-profile via browser.request
CVSS 8.1
OpenClaw < 2026.3.22 - Unresolved Service Metadata Routing via Bonjour and DNS-SD Discovery
CVSS 4.6
OpenClaw < 2026.3.22 - Allowlist Bypass via Unregistered Time Dispatch Wrapper
CVSS 8.8
OpenClaw < 2026.3.22 - Webhook Reply Rebinding via Username Resolution in Synology Chat
CVSS 5.9
OpenClaw assertPublicHostname web-fetch.ts server-side request forgery
CVSS 5.6
OpenClaw < 2026.3.22 - Unauthenticated Resource Exhaustion via Voice Call Webhook
CVSS 5.3
OpenClaw < 2026.3.22 - Unauthenticated Cryptographic Work in Nostr Inbound DM Handling
CVSS 6.5
OpenClaw < 2026.3.22 - Unbounded Memory Allocation via Remote Media Error Responses
CVSS 5.3
OpenClaw < 2026.3.22 - Webhook Path Route Replacement Vulnerability in Synology Chat
CVSS 4.8
OpenClaw < 2026.3.22 - Premature Cite Expansion Before Authorization in Channel and DM
CVSS 7.3
OpenClaw < 2026.3.22 - Privilege Escalation via Self-Declared Scopes in Trusted-Proxy Control UI
CVSS 8.8
OpenClaw < 2026.3.22 - Remote File URL Acceptance in Windows Media Loaders
CVSS 5.3
OpenClaw < 2026.3.8 - Script Content Modification via Mutable Operand Binding in system.run
CVSS 6.3
OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlist Configuration
CVSS 4.3
OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlist Configuration
CVSS 4.3
OpenClaw < 2026.3.8 - Path Traversal via Tools Root Rebinding in Skills Download
CVSS 6.2
OpenClaw < 2026.3.7 - Shell Approval Gating Bypass via Dispatch Wrapper Depth Mismatch
CVSS 5.3
OpenClaw <2026.3.7 - Sandbox Escape
CVSS 6.1
OpenClaw < 2026.2.25 - Privilege Escalation via Unpaired Device Identity in Shared Gateway Authentication
CVSS 8.8
OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Parameter
CVSS 6.5
OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation
CVSS 5.5