Peter Steinberger
176 exploits
Active since Feb 2026
OpenClaw < 2026.2.23 - Sandbox Bypass in apply_patch Tool via Workspace-Only Check Bypass
CVSS 6.8
OpenClaw < 2026.2.21 - Arbitrary Local File Read via Browser Navigation Guard
CVSS 6.5
OpenClaw < 2026.2.24 - Binary Hijacking via Static Default Trusted Directories in safeBins
CVSS 5.7
OpenClaw < 2026.2.22 - Allowlist Bypass via sort --compress-program Parameter
CVSS 6.3
OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing
CVSS 7.5
OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods
CVSS 8.8
OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields
CVSS 8.0
OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Validation
CVSS 7.8
OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS
CVSS 7.8
OpenClaw < 2026.2.19 - Arbitrary File Write via Short-Option Bypass in exec Allowlist
CVSS 7.1
OpenClaw < 2026.2.19 - Race Condition in Sandbox Registry Write Operations
CVSS 3.6
OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard
CVSS 7.4
OpenClaw < 2026.2.22 - Arbitrary File Read via Symlink Following in Static File Handler
CVSS 3.3
OpenClaw < 2026.2.22 - Authorization Bypass via Display Name Collision in Feishu allowFrom
CVSS 6.5
OpenClaw < 2026.2.21 - Arbitrary File Read via grep -e Flag Policy Bypass
CVSS 6.5
OpenClaw < 2026.2.24 - Approval Gating Bypass via Dispatch-Wrapper Depth-Cap Mismatch in system.run
CVSS 7.1
OpenClaw < 2026.2.22 - Symlink Traversal in Avatar Handling
CVSS 5.5
OpenClaw < 2026.2.25 - Password Brute-Force via Browser-Origin WebSocket Authentication Bypass
CVSS 7.5
OpenClaw < 2026.2.24 - Arbitrary File Read via Improper Temporary Path Validation in Sandbox
CVSS 6.5
OpenClaw < 2026.2.26 - Improper Authorization via DM Pairing Store Identity Inheritance in Group Allowlist
CVSS 6.5
OpenClaw < 2026.2.25 - Missing Authorization Check in Discord DM Reaction Ingress
CVSS 5.3
OpenClaw < 2026.2.19 - Sensitive File Disclosure via stageSandboxMedia Path Traversal
CVSS 7.5
OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variable
CVSS 7.8
OpenClaw < 2026.2.24 - Path Traversal via @-prefixed Absolute Paths in Workspace Boundary Validation
CVSS 6.5
OpenClaw < 2026.2.22 - Redirect Chain Bypass of Media Host Allowlist in MSTeams Attachment Handling
CVSS 6.0