Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 21 March 2026
RSS46 vulnerabilities published on 21 March 2026
Severity:
WebCTRL sends unencrypted sensitive data over the network
CVE-2026-24060
The WebCTRL system sends sensitive information, such as file position and data, without encryption when transmitting updates over the network. This means an unauthorized person with access to the netw...
9.1
OpenClaw version 2026.3.1 and earlier: Authorized users can access sensitive settings
CVE-2026-32051
Authenticated users with certain permissions can access and control sensitive features in OpenClaw. This means that an attacker with the wrong level of access can still make changes they shouldn't be ...
8.7
OpenClaw Devices Can Access More Features Without Approval
CVE-2026-32042
OpenClaw devices running versions 2026.2.22 to 2026.2.24 are vulnerable to a security issue that allows unpaired devices to access more features than they should. This can happen if an attacker uses a...
8.7
OpenClaw Sandbox Browser Allows Unauthenticated Access to VNC Interface
CVE-2026-32064
OpenClaw versions prior to 2026.2.21 have a security flaw that lets hackers access the browser without a password. This can happen when a hacker is on the same network as the computer running OpenClaw...
8.5
WebCTRL service impersonation risk from unauthorized port sharing
CVE-2026-25086
An attacker can impersonate the WebCTRL service if they can bind to the same port, potentially allowing them to send malicious packets. This could happen if the port is not properly secured. To protec...
7.7
OpenClaw versions prior to 2026.2.26 allow attackers to write files outside the workspace
CVE-2026-32055
Old versions of OpenClaw can be tricked into saving files in the wrong place, outside of the workspace, if an attacker creates a special kind of shortcut. This could allow an attacker to write sensiti...
7.2
OpenClaw versions fail to sanitize environment variables, allowing command bypass
CVE-2026-32056
Old versions of OpenClaw don't properly clean up environment variables, which could let attackers sneak in malicious code before security checks. This means an attacker could run unauthorized commands...
7.7
OpenClaw Media Buffer Overflow Vulnerability
CVE-2026-32049
Versions of OpenClaw prior to 2026.2.22 can be exploited by an attacker to cause memory issues and possible crashes. This is a concern for organizations using OpenClaw, as it could lead to system inst...
8.7
OpenClaw Sandbox Bypass in Pre-2026.3.1 Versions
CVE-2026-32048
Versions of OpenClaw before 2026.3.1 have a security flaw that allows a malicious user to bypass security restrictions when creating new processes. This could lead to unauthorized access and potential...
7.7
WebCTRL Systems Can Be Tricked by Fake BACnet Messages
CVE-2026-32666
WebCTRL systems can be vulnerable to fake messages sent over the network, potentially allowing an attacker to control certain devices or disrupt the system. This is because WebCTRL does not verify the...
7.5
WowOptin WordPress Plugin Allows Hackers to Control Server Actions
CVE-2026-4302
The WowOptin WordPress plugin exposes a security risk that allows hackers to make unauthorized requests to any website or server connected to the plugin, potentially stealing or modifying sensitive in...
7.2
Injection Guard Plugin for WordPress allows malicious scripts in admin logs
CVE-2026-3368
A security issue in the Injection Guard plugin for WordPress allows hackers to inject malicious scripts into the admin log page, which can be executed when an administrator views the log. This affects...
7.2
Discourse: Unauthenticated users can guess membership in private groups
CVE-2026-33425
Unauthenticated users can determine if a private group member exists, potentially compromising group confidentiality. This affects Discourse versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2...
6.9
OpenClaw Prior to 2026.2.25: Local File Overwrite Risk
CVE-2026-32054
An attacker with local access to your system can use OpenClaw's browser trace and download feature to write files outside the intended directory, potentially overwriting important system files. This c...
5.9
Twilio Webhook Events Can Be Replayable in OpenClaw
CVE-2026-32053
If you're using OpenClaw versions prior to 2026.2.23, an attacker could potentially send old or duplicate Twilio event messages, causing your system to handle calls incorrectly or become corrupted. Th...
6.9
OpenClaw, versions before 2026.2.25: Malicious File Execution Risk
CVE-2026-32043
OpenClaw users are at risk of executing malicious files on their systems if an attacker manipulates a symbolic link. This can happen if a user approves a job with a validated path, but the actual path...
5.9
OpenClaw versions prior to 2026.2.24 allow hackers to run secret commands
CVE-2026-32052
Some versions of OpenClaw are vulnerable to a security risk that lets hackers trick the system into running hidden commands. This can happen when the system is told to run a command from a misleading ...
5.8
Scoreboard for HTML5 Games Lite plugin allows malicious scripts to run on WordPress sites
CVE-2026-4083
The Scoreboard for HTML5 Games Lite plugin for WordPress has a security flaw that allows attackers with admin access to inject malicious code into web pages. This could allow them to take control of a...
6.4
Contact List plugin for WordPress: Malicious scripts can be injected via Google Maps field
CVE-2026-3516
The Contact List plugin for WordPress is at risk because an attacker with contributor-level access can inject malicious scripts into the plugin's Google Maps field. This could allow the attacker to ta...
6.4
Image Alt Text Manager plugin for WordPress allows attackers to inject malicious scripts into posts
CVE-2026-3350
The Image Alt Text Manager plugin for WordPress is vulnerable to a security risk that allows attackers to inject malicious scripts into posts. This could allow an attacker to take control of a website...
6.4
Autoptimize Plugin for WordPress Can Allow Malicious Code Injection
CVE-2026-2430
The Autoptimize plugin for WordPress has a security flaw that allows attackers to inject malicious code into web pages. This can happen if a user with sufficient access rights edits a page with an ima...
6.4
Autoptimize plugin for WordPress allows attackers to inject malicious scripts
CVE-2026-2352
The Autoptimize plugin for WordPress is vulnerable to a security threat that could allow attackers to inject malicious code into a website. This means that if an attacker has permission to edit the we...
6.4
iTracker360 Plugin for WordPress: Malicious Scripts Injected via Administrator Action
CVE-2026-3572
The iTracker360 plugin for WordPress is vulnerable to a security flaw that allows attackers to inject malicious scripts if an administrator clicks on a link. This can happen if the plugin is version 2...
6.1
OpenClaw Control UI Pairing Bypass in Older Versions Allows Unauthorized Access
CVE-2026-32057
Older OpenClaw versions lack proper authentication checks for the Control UI pairing process, allowing a malicious user to gain unauthorized access to certain functions. This affects any organization ...
6.0
OpenClaw: Trusted Network Attackers Can Bypass Passwords on HTTP Gateway
CVE-2026-32045
Old versions of OpenClaw have a security mistake that lets attackers on trusted networks access sensitive areas of the HTTP gateway without the usual login requirements. This could let unauthorized pe...
8.2