Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 18 March 2026
RSS42 vulnerabilities published on 18 March 2026
Severity:
OpenClaw Sandbox Bypass on Symlinked Paths
GHSA-m8v2-6wwh-r4gc
CVE-2026-27523
A security flaw in OpenClaw's sandboxing feature could allow an attacker to access prohibited areas. This issue affects OpenClaw versions up to 2026.2.23. To fix the issue, update to version 2026.2.24...
6.9
OpenClaw allows attackers to execute malicious code during startup
GHSA-8fmp-37rc-p5g7
CVE-2026-22177
OpenClaw's configuration allows unauthorized environment variables to be injected during startup, potentially allowing attackers to execute malicious code. This vulnerability affects OpenClaw versions...
6.9
OpenClaw Gateway Token Leaked to Local Listener
GHSA-v3j7-34xh-6g3w
CVE-2026-22174
A security issue in OpenClaw Gateway allows an attacker on the same local network to steal the gateway authentication token, potentially allowing them to access your account. This only affects shared-...
5.9
Sentry: Malicious Access to Shared Error Data
CVE-2026-26004
Versions of Sentry's error tracking tool before 26.1.0 allow unauthorized access to sensitive data shared between organizations. This could lead to sensitive data being exposed or manipulated. Update ...
5.7
OpenClaw allows malicious shell execution through Homebrew layout
GHSA-p4wh-cr8m-gm6c
CVE-2026-22217
A vulnerability in OpenClaw allows an attacker to run malicious code if they can influence the system's shell. This could happen if an attacker can write a malicious program to a directory where OpenC...
5.8
OpenClaw Browser Output Bypass: Unintended Writes Possible
GHSA-3pxq-f3cp-jmxp
CVE-2026-22180
A security issue in OpenClaw, a tool for browser output handling, allowed malicious writes outside intended folders. This could potentially lead to data corruption or unauthorized changes. To fix this...
4.8
Next.js: Null Origin Can Bypass Server Actions Security Checks
GHSA-mq59-m269-xvcx
CVE-2026-27978
A security issue in Next.js allows malicious requests from certain hidden contexts to impersonate a legitimate user's actions. This could lead to unauthorized changes being made on a site using Next.j...
5.3
OpenClaw versions prior to 2026.2.22 with the optional BlueBubbles plugin contain an access control bypass vulnerability where empty allowFrom configuration causes dmPolicy pairing and allowlist re...
GHSA-jwf4-8wf4-jf2m
CVE-2026-22170
OpenClaw versions prior to 2026.2.22 with the optional BlueBubbles plugin contain an access control bypass vulnerability where empty allowFrom configuration causes dmPolicy pairing and allowlist restr...
6.3
LDAP Account Manager PDF Export Allows Remote Code Execution
CVE-2026-27895
A security flaw in the LDAP Account Manager's PDF export feature allows an attacker to upload malicious files, potentially taking control of the server. This can happen when using older versions of LD...
4.3
Portabilis i-Educar 2.11: Remote Code Injection via Malicious Input
CVE-2026-4355
A security flaw in Portabilis i-Educar 2.11 allows an attacker to inject malicious code into the system when a user enters a specially crafted input. This could potentially allow an attacker to take c...
5.1
TRENDnet Router Web Interface Allows Remote Attack
CVE-2026-4354
A security flaw in the TRENDnet TEW-824DRU router's web interface allows an attacker to remotely hack into the device. This could lead to unauthorized access and potentially let the attacker take cont...
5.1
OpenClaw's debug mode can be tricked into accepting unauthorized overrides
GHSA-62f6-mrcj-v8h5
CVE-2026-27524
OpenClaw's debug mode allows someone with permission to make changes to bypass some security restrictions. This can't be exploited by anyone without already having access to the debug mode. However, i...
2.3
Cross-Site Scripting in itsourcecode University Management System 1.0
CVE-2026-4356
A security flaw in itsourcecode University Management System 1.0 can allow hackers to inject malicious code into the system, potentially allowing them to access sensitive information or take control o...
4.8
Next.js: Untrusted Networks Can Connect to Development Server
GHSA-jcc7-9wpm-mj36
CVE-2026-27977
If you're running a Next.js development server on a network that's accessible to others, a malicious user could potentially connect to your development server and see sensitive information. This only ...
2.3
pyOpenSSL TLS connection bypass through unhandled exception
GHSA-vp96-hxj8-p424
CVE-2026-27448
A previous version of pyOpenSSL allowed an attacker to bypass security features by causing a callback function to crash. This has been fixed, so connections will now be rejected if the callback fails....
1.7
CGA-hmg3-xp5x-p9q9
Adobe Flash Player allows attackers to execute malicious code on a user's computer
CGA-hmg3-xp5x-p9q9
Adobe Flash Player is vulnerable to a critical security issue that could allow attackers to execute malicious code on a user's computer if they visit a compromised website. This could lead to unauthor...