Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: openclaw

Found 53 matching suggestions

Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.13 - Denial of Service via Unbounded Webhook Request Body Buffering

OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to webhook endpoints causing memory pressure and availability degradation.

Affected products

OpenClaw
  • <2026.2.13

Matching in nixpkgs

Package maintainers

Unafffected, never had 2026.2.13 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.2 - Exec Allowlist Bypass via Command Substitution in Double Quotes

OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection by embedding unescaped $() or backticks inside double-quoted strings to execute unauthorized commands.

Affected products

OpenClaw
  • <2026.2.2

Matching in nixpkgs

Package maintainers

Unafffected, never had 2026.2.2 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Local File Inclusion via mediaPath Parameter in BlueBubbles Media Handling

OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBubblesMedia function fails to validate mediaPath parameters against an allowlist, enabling attackers to request sensitive files like /etc/passwd and exfiltrate them as media attachments.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unafffected, never had 2026.2.14 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake

OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without providing device identity or pairing by exploiting the presence check instead of validation, potentially gaining operator access in vulnerable deployments.

Affected products

OpenClaw
  • <2026.2.2

Matching in nixpkgs

Package maintainers

Unafffected, never had 2026.2.2 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.15 - Denial of Service via Unbounded Response Parsing in web_fetch Tool

OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability in the web_fetch tool that allows attackers to crash the Gateway process through memory exhaustion by parsing oversized or deeply nested HTML responses. Remote attackers can social-engineer users into fetching malicious URLs with pathological HTML structures to exhaust server memory and cause service unavailability.

Affected products

OpenClaw
  • <2026.2.15

Matching in nixpkgs

Package maintainers

Unafffected, never had 2026.2.15 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw 2.0.0-beta3 < 2026.2.14 - Arbitrary JavaScript Module Loading via Hook Transform Path Traversal

OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.14 - Remote Code Execution via Node Invoke Approval Bypass

OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attackers with valid gateway credentials can inject approval control fields to execute arbitrary commands on connected node hosts, potentially compromising developer workstations and CI runners.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching

OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.

Affected products

OpenClaw
  • <2026.2.1

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.1 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw 2026.1.5 < 2026.2.14 - Arbitrary Code Execution via Unsafe Hook Module Path Handling

OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process.

Affected products

OpenClaw
  • <2026.2.14

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.14 or older.
Dismissed
updated 6 days, 10 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin

OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.

Affected products

OpenClaw
  • <2026.2.2

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.2 or older.