Peter Steinberger
176 exploits
Active since Feb 2026
OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth
CVSS 5.9
OpenClaw < 2026.2.21 - OS-level Sandbox Bypass via --no-sandbox Flag
CVSS 5.3
OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass
CVSS 7.5
OpenClaw < 2026.2.25 - Unauthorized Reaction Status Event Enqueue via Access Check Bypass
CVSS 3.7
OpenClaw < 2026.2.24 - Hidden Command Execution via Shell-Wrapper Positional argv Carriers
CVSS 6.4
OpenClaw < 2026.2.23 - Twilio Webhook Replay Bypass via Randomized Event ID Normalization
CVSS 6.5
OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling
CVSS 6.5
OpenClaw < 2026.2.26 - Workspace Path Boundary Bypass via Non-existent Symlink
CVSS 7.6
OpenClaw < 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Injection in system.run
CVSS 7.5
OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter
CVSS 7.1
OpenClaw < 2026.2.26 - Approval Context-Binding Weakness in system.run via host=node
CVSS 2.6
OpenClaw < 2026.2.21 - Missing VNC Authentication in Sandbox Browser noVNC Observer
CVSS 7.7
OpenClaw < 2026.2.25 - Approval Identity Mismatch in system.run Command Execution
CVSS 4.8
OpenClaw < 2026.2.26 - Cross-Account Authorization Bypass in DM Pairing Store
CVSS 3.7
OpenClaw < 2026.2.26 - Sender Authorization Bypass in Slack System Event Handlers
CVSS 5.4
OpenClaw < 2026.2.21 - Unauthenticated Webhook Access via Passwordless Fallback in BlueBubbles Plugin
CVSS 4.8
OpenClaw < 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback
CVSS 3.7
OpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata
CVSS 5.4
OpenClaw < 2026.2.25 - Sender Policy Bypass in Slack Reaction and Pin Event Handlers
CVSS 4.3
OpenClaw < 2026.2.22 - Node Role Device-Identity Bypass via WebSocket Authentication
CVSS 5.4
OpenClaw < 2026.2.23 - Sandbox Boundary Bypass via Image Tool workspaceOnly Bypass
CVSS 5.3
OpenClaw < 2026.2.22 - Remote Code Execution via SHELLOPTS/PS4 Environment Injection in system.run
CVSS 6.6
OpenClaw < 2026.3.2 - Authentication Bypass via Encoded Path in /api/channels Route
CVSS 6.5
OpenClaw < 2026.2.25 - Authorization Bypass in Interactive Callbacks via Sender Check Skip
CVSS 6.8
OpenClaw < 2026.2.26 - Authorization Bypass via DM Pairing-Store Fallback in Group Allowlist
CVSS 3.1