Peter Steinberger
176 exploits
Active since Feb 2026
OpenClaw < 2026.2.22 - Allowlist Bypass via Command Substitution in system.run
CVSS 7.2
OpenClaw < 2026.3.2 - Path Confinement Bypass in Browser Output and File Write Operations
CVSS 5.3
OpenClaw 2026.2.22 < 2026.2.23 - Arbitrary Binary Execution via $SHELL Environment Variable Trusted Prefix Fallback
CVSS 6.1
OpenClaw < 2026.2.24 - Arbitrary File Read via sendAttachment and setGroupIcon Message Actions
CVSS 6.5
OpenClaw < 2026.2.24 - Sandbox Bind Validation Bypass via Symlink-Parent Missing-Leaf Paths
CVSS 6.1
OpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path
CVSS 4.3
OpenClaw < 2026.2.26 - Approval Bypass via Parent Symlink Current Working Directory Rebind
CVSS 6.1
OpenClaw <2026.2.23 - Command Injection
CVSS 8.8
OpenClaw <2026.2.17 - Path Traversal
CVSS 4.4
OpenClaw <2026.2.22 - DoS
CVSS 7.5
OpenClaw <2026.2.2 - Command Injection
CVSS 9.8
OpenClaw <2026.2.14 - Privilege Escalation
CVSS 7.5
OpenClaw <2026.2.14 - Path Traversal
CVSS 7.7
OpenClaw <2026.2.15 - DoS
CVSS 6.5
OpenClaw <2026.2.1 - Auth Bypass
CVSS 9.4
OpenClaw 2026.1.29-beta.1-2026.2.1 - Path Traversal
CVSS 8.1
OpenClaw 2026.1.29-2026.2.1 - Auth Bypass
CVSS 7.3
OpenClaw <2026.2.14 - SSRF
CVSS 8.3
OpenClaw <2026.2.14 - DoS
CVSS 5.5
OpenClaw <2026.2.14 - Path Traversal
CVSS 7.5
OpenClaw <2026.2.2 - Auth Bypass
CVSS 7.5
OpenClaw 2026.1.5-2026.2.14 - Code Injection
CVSS 7.2
OpenClaw <2026.2.14 - Path Traversal
CVSS 6.1
OpenClaw <2026.2.1 - Info Disclosure
CVSS 8.1
OpenClaw - Info Disclosure
CVSS 8.4