Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: openclaw

Found 6 matching suggestions

created 1 day ago
OpenClaw File Existence tools.exec.safeBins information exposure

A vulnerability was identified in OpenClaw up to 2026.2.17. This issue affects the function tools.exec.safeBins of the component File Existence Handler. The manipulation leads to information exposure through discrepancy. The attack needs to be performed locally. Upgrading to version 2026.2.19-beta.1 is capable of addressing this issue. The identifier of the patch is bafdbb6f112409a65decd3d4e7350fbd637c7754. Upgrading the affected component is advised.

Affected products

OpenClaw
  • ==2026.2.4
  • ==2026.2.15
  • ==2026.2.5
  • ==2026.2.1
  • ==2026.2.0
  • ==2026.2.10
  • ==2026.2.3
  • ==2026.2.14
  • ==2026.2.8
  • ==2026.2.17
  • ==2026.2.19-beta.1
  • ==2026.2.7
  • ==2026.2.11
  • ==2026.2.12
  • ==2026.2.2
  • ==2026.2.13
  • ==2026.2.9
  • ==2026.2.16
  • ==2026.2.6

Matching in nixpkgs

Package maintainers

created 1 day ago
OpenClaw < 2026.2.17 - Arbitrary File Read via $include Directive Path Traversal

OpenClaw versions prior to 2026.2.17 contain a path traversal vulnerability in the $include directive resolution that allows reading arbitrary local files outside the config directory boundary. Attackers with config modification capabilities can exploit this by specifying absolute paths, traversal sequences, or symlinks to access sensitive files readable by the OpenClaw process user, including API keys and credentials.

Affected products

openclaw
  • <2026.2.17
  • ==2026.2.17

Matching in nixpkgs

Package maintainers

created 1 day ago
OpenClaw 2026.2.22-2 < 2026.2.23 - Allowlist Bypass via sort Long-Option Abbreviation in tools.exec.safeBins

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode.

Affected products

openclaw
  • <2026.2.23
  • ==2026.2.23

Matching in nixpkgs

Package maintainers

created 1 day ago
OpenClaw 2026.2.21-2 < 2026.2.22 - Unauthenticated WebSocket Resource Exhaustion via Media Stream

OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attackers can hold idle pre-authenticated sockets open to consume connection resources and degrade service availability for legitimate streams.

Affected products

openclaw
  • <2026.2.22
  • ==2026.2.22
voice-call
  • ==2026.2.22
  • ==2026.2.21

Matching in nixpkgs

Package maintainers

created 1 day ago
OpenClaw 2026.2.19-2 < 2026.2.21 - Command Injection via Newline in systemd Unit Generation

OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vulnerability in systemd unit file generation where attacker-controlled environment values are not validated for CR/LF characters, allowing newline injection to break out of Environment= lines and inject arbitrary systemd directives. An attacker who can influence config.env.vars and trigger service install or restart can execute arbitrary commands with the privileges of the OpenClaw gateway service user.

Affected products

openclaw
  • ==2026.2.21
  • <2026.2.21

Matching in nixpkgs

Package maintainers

created 1 day ago
OpenClaw < 2026.2.14 - Path Traversal in apply_patch via Crafted Paths

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containment, attackers can exploit crafted paths including directory traversal sequences or absolute paths to escape workspace boundaries and modify arbitrary files.

Affected products

openclaw
  • ==0
  • ==2026.2.14

Matching in nixpkgs

Package maintainers