CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad

CVEReports
•about 1 hour ago•CVE-2026-28490
8.3

CVE-2026-28490: Bleichenbacher Padding Oracle in Authlib RSA1_5 JWE Implementation

Authlib versions prior to 1.6.9 contain a cryptographic padding oracle vulnerability in the JSON Web Encryption (JWE) RSA1_5 implementation. By mishandling the length check of decrypted Content Encryption Keys (CEK), the library exposes an exception oracle that allows unauthenticated remote attackers to decrypt intercepted JWE tokens via a Bleichenbacher attack.

Alon Barad
Alon Barad
4 views•7 min read
•about 2 hours ago•CVE-2026-32732
0.0

CVE-2026-32732: Cross-Site Scripting (XSS) in @leanprover/unicode-input-component

The @leanprover/unicode-input-component npm package, utilized by the Lean 4 VS Code Extension, contains a Cross-Site Scripting (XSS) vulnerability. Versions 0.1.9 and lower fail to properly neutralize script-related HTML tags during unicode abbreviation processing, leading to arbitrary JavaScript execution in the client context.

Amit Schendel
Amit Schendel
2 views•6 min read
•about 12 hours ago•CVE-2026-3910
8.8

CVE-2026-3910: Type Confusion in V8 Maglev Compiler Leading to Remote Code Execution

CVE-2026-3910 is a high-severity vulnerability in the Google Chrome V8 JavaScript engine. An inappropriate implementation in the Maglev compiler's Phi untagging pass allows a remote attacker to achieve arbitrary code execution within the browser sandbox. Google Threat Analysis Group (TAG) confirmed this zero-day vulnerability was exploited in the wild prior to the patch release in Chrome version 146.0.7680.75.

Alon Barad
Alon Barad
27 views•6 min read
•about 12 hours ago•CVE-2026-3909
8.8

CVE-2026-3909: Remote Code Execution via Out-of-Bounds Write in Google Skia Graphics Engine

A critical out-of-bounds (OOB) write vulnerability exists in the Google Skia 2D graphics engine, affecting Chrome, ChromeOS, Android, and Flutter. This flaw allows remote attackers to execute arbitrary code within the renderer process via crafted HTML content and is actively exploited in the wild.

Alon Barad
Alon Barad
33 views•7 min read
•2 days ago•GHSA-7H7G-X2PX-94HJ
5.3

GHSA-7H7G-X2PX-94HJ: Credential Exposure in OpenClaw Device Pairing

The OpenClaw personal AI assistant ecosystem suffers from an insufficiently protected credentials vulnerability (CWE-522) during the device pairing process. The Gateway generates setup codes that embed permanent, shared authentication tokens rather than ephemeral bootstrap keys. Interception of these codes grants an attacker persistent access to the user's Gateway, exposing integrated AI service API keys, chat histories, and agent configurations. The vulnerability is resolved in version v2026.3.12 through the implementation of short-lived, per-device session credentials.

Amit Schendel
Amit Schendel
19 views•6 min read
•2 days ago•GHSA-VMHQ-CQM9-6P7Q
7.1

GHSA-VMHQ-CQM9-6P7Q: Privilege Escalation via Incorrect Authorization in OpenClaw Gateway

A high-severity authorization bypass vulnerability exists in the OpenClaw AI assistant platform. It permits users with write-scoped permissions to interact with restricted administrative endpoints. This flaw enables attackers to modify or delete persistent browser profiles, hijacking browser infrastructure via malicious Chrome DevTools Protocol (CDP) URLs.

Alon Barad
Alon Barad
63 views•5 min read
•2 days ago•GHSA-M69H-JM2F-2PV8
Moderate

GHSA-m69h-jm2f-2pv8: Authorization Bypass via Insecure Event Resolution in OpenClaw Feishu Extension

An authorization bypass vulnerability exists in the Feishu extension of the OpenClaw AI assistant framework. By exploiting an insecure default in the reaction event processing logic, attackers can trigger bot actions in restricted group contexts, bypassing mention gating and group authorization controls.

Amit Schendel
Amit Schendel
8 views•7 min read
•2 days ago•GHSA-F8R2-VG7X-GH8M
5.3

GHSA-f8r2-vg7x-gh8m: Path Overmatching and Command Execution Bypass in OpenClaw

OpenClaw versions up to 2026.3.8 suffer from an improper input validation vulnerability in the command execution allowlist mechanism. Flawed pattern matching logic, including improper lowercasing on POSIX systems and broad glob wildcard handling, allows an attacker to bypass execution restrictions and invoke unauthorized commands.

Amit Schendel
Amit Schendel
7 views•5 min read
•2 days ago•GHSA-R7VR-GR74-94P8
8.8

GHSA-r7vr-gr74-94p8: Improper Authorization and Privilege Escalation in OpenClaw

OpenClaw versions prior to v2026.3.12 contain an improper authorization vulnerability in the command dispatcher logic. A missing ownership validation check allows any user on the general allowlist to execute highly sensitive administrative commands. This flaw exposes the bot configuration and debug surfaces, leading to potential information disclosure and service disruption.

Alon Barad
Alon Barad
69 views•5 min read
•3 days ago•GHSA-99QW-6MR3-36QR
9.6

GHSA-99QW-6MR3-36QR: Remote Code Execution via Malicious Workspace Plugins in OpenClaw

OpenClaw, an open-source AI agent platform, contains a critical vulnerability in its plugin auto-discovery mechanism. The platform implicitly trusts and executes code located within the `.openclaw/extensions/` directory of any opened workspace. This behavior allows an attacker to achieve arbitrary code execution by convincing a user to clone and open a maliciously crafted repository.

Amit Schendel
Amit Schendel
73 views•7 min read
•3 days ago•GHSA-WCXR-59V9-RXR8
9.9

GHSA-WCXR-59V9-RXR8: Sandbox Escape via Improper Authorization in OpenClaw session_status Tool

The OpenClaw `session_status` tool fails to properly validate authorization boundaries when processing the `sessionKey` parameter. This flaw allows restricted sandboxed subagents to read or influence the state of higher-privileged parent sessions, resulting in a critical sandbox escape.

Alon Barad
Alon Barad
74 views•5 min read
•3 days ago•GHSA-RQPP-RJJ8-7WV8
9.9

GHSA-RQPP-RJJ8-7WV8: Privilege Escalation via Logic Flaw in OpenClaw WebSocket Authentication

A critical logic flaw in the OpenClaw gateway's WebSocket authentication mechanism allows remote attackers authenticated via shared secrets to arbitrarily elevate their authorization scopes to administrative levels.

Alon Barad
Alon Barad
72 views•6 min read
SeverityExploitPeriodCatalog
Sort

Or generate a custom report

Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis

Automated vulnerability intelligence. 1,127+ reports.