Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
10.0 CRITICAL
CVE-2026-40281 — Gotenberg vulnerable to argument injection via newlines in ExifTool metadata values

Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsani…

gotenberg | Remote | Injection
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
7.1 HIGH
CVE-2026-40251 — Incus out-of-bounds panic in snapshot metadata handling allows denial of service

Incus is a system container and virtual machine manager. In versions before 7.0.0, missing validation logic in the storage volume import logic allows an authenticated user with access to the storage …

incus | Remote | Denial of Service
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
2.3 LOW
CVE-2026-40243 — Incus OVN TLS verification accepts peer-supplied roots and permits endpoint impersonation

Incus is a system container and virtual machine manager. In versions before 7.0.0, broken TLS validation logic in the OVN database connection logic can allow connections to an attacker's OVN database…

incus | Cryptography
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
7.1 HIGH
CVE-2026-40197 — Incus nil-pointer dereference in custom volume import allows denial of service

Incus is a system container and virtual machine manager. In versions before 7.0.0, missing validation logic in the storage volume import logic allows an authenticated user with access to the storage …

incus | Remote | Denial of Service
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
7.1 HIGH
CVE-2026-40195 — Incus nil-pointer dereference in storage bucket import allows denial of service

Incus is a system container and virtual machine manager. In versions before 7.0.0, missing validation logic in the storage bucket import logic allows an authenticated user with access to the storage …

incus | Remote | Denial of Service
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
5.5 MEDIUM
CVE-2026-8033 — PicoTronica e-Clinic Healthcare System ECHS Response Header v2 information disclosure

A vulnerability has been found in PicoTronica e-Clinic Healthcare System ECHS 5.7. This affects an unknown function of the file /cdemos/echs/api/v2/ of the component Response Header Handler. Such man…

Remote | Information Disclosure
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
7.5 HIGH
CVE-2026-8032 — PicoTronica e-Clinic Healthcare System ECHS echs.js hard-coded credentials

A flaw has been found in PicoTronica e-Clinic Healthcare System ECHS 5.7. The impacted element is an unknown function of the file /cdemos/echs/priv/echs.js. This manipulation of the argument ADMIN_KE…

Remote | Authentication
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
8.5 HIGH
CVE-2026-44118 — OpenClaw < 2026.4.22 - Owner Context Spoofing via Bearer Token Header

OpenClaw before 2026.4.22 derives loopback MCP owner context from spoofable server-issued bearer tokens in request headers. Non-owner loopback clients can present themselves as owner to bypass owner-…

openclaw | Authorization
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
6.3 MEDIUM
CVE-2026-44117 — OpenClaw < 2026.4.20 - Server-Side Request Forgery in QQBot Direct Media Upload

OpenClaw before 2026.4.20 contains a server-side request forgery vulnerability in QQBot direct media upload that skips URL validation. Attackers can bypass SSRF protections by sending crafted image U…

openclaw | Remote | Server-Side Request Forgery
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
8.6 HIGH
CVE-2026-44116 — OpenClaw < 2026.4.22 - Server-Side Request Forgery in Zalo Photo URL Validation

OpenClaw before 2026.4.22 contains a server-side request forgery vulnerability in the Zalo plugin's sendPhoto function that fails to validate outbound photo URLs through the SSRF guard. Attackers can…

openclaw | Remote | Server-Side Request Forgery
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
8.8 HIGH
CVE-2026-44115 — OpenClaw < 2026.4.22 - Shell Expansion Bypass in Unquoted Heredocs via Exec Allowlist

OpenClaw before 2026.4.22 contains an exec allowlist analysis vulnerability allowing shell expansion hiding in unquoted heredoc bodies. Attackers can bypass allowlist validation by embedding shell ex…

openclaw | Remote | Injection
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
8.5 HIGH
CVE-2026-44114 — OpenClaw < 2026.4.20 - Environment Variable Namespace Collision via Workspace dotenv

OpenClaw before 2026.4.20 fails to properly reserve the OPENCLAW_ runtime-control environment namespace in workspace dotenv files, allowing attackers to override critical runtime variables. Malicious…

openclaw | Misconfiguration
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
6.3 MEDIUM
CVE-2026-44113 — OpenClaw < 2026.4.22 - Time-of-Check/Time-of-Use Race Condition in OpenShell FS Bridge

OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in the OpenShell filesystem bridge that allows attackers to read files outside the intended mount root. Attackers can exp…

openclaw | Remote | Race Condition
May 06, 2026 May 07, 2026
May 06, 2026
May 07, 2026
6.0 MEDIUM
CVE-2026-44112 — OpenClaw < 2026.4.22 - Symlink Swap Race Condition in OpenShell FS Bridge Writes

OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in OpenShell sandbox filesystem writes that allows attackers to redirect writes outside the intended mount root. Attacker…

openclaw | Remote | Race Condition
May 06, 2026 May 06, 2026
May 06, 2026
May 06, 2026
4.3 MEDIUM
CVE-2026-44111 — OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get

OpenClaw before 2026.4.15 contains an arbitrary file read vulnerability in the QMD backend memory_get function that allows callers to read any Markdown files within the workspace root. Attackers with…

openclaw | Remote | Path Traversal
May 06, 2026 May 06, 2026
May 06, 2026
May 06, 2026
8.8 HIGH
CVE-2026-44110 — OpenClaw < 2026.4.15 - Authorization Bypass in Matrix Room Control Commands via DM Pairi…

OpenClaw before 2026.4.15 contains an authorization bypass vulnerability in Matrix room control-command authorization that trusts DM pairing-store entries. Attackers with DM-paired sender IDs can exe…

openclaw | Remote | Authorization
May 06, 2026 May 06, 2026
May 06, 2026
May 06, 2026
9.8 CRITICAL
CVE-2026-44109 — OpenClaw < 2026.4.15 - Authentication Bypass in Feishu Webhook and Card-Action Validation

OpenClaw before 2026.4.15 contains an authentication bypass vulnerability in Feishu webhook and card-action validation that allows unauthenticated requests to reach command dispatch. Missing encryptK…

openclaw | Remote | Authentication
May 06, 2026 May 06, 2026
May 06, 2026
May 06, 2026
9.2 CRITICAL
CVE-2026-43585 — OpenClaw < 2026.4.15 - Bearer Token Validation Bypass via Stale SecretRef Resolution

OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-reso…

openclaw | Remote | Authentication
May 06, 2026 May 06, 2026
May 06, 2026
May 06, 2026
8.8 HIGH
CVE-2026-43584 — OpenClaw < 2026.4.10 - Insufficient Environment Variable Denylist in Exec Policy

OpenClaw before 2026.4.10 contains an insufficient environment variable denylist vulnerability in its exec environment policy that allows operator-supplied overrides of high-risk interpreter startup …

openclaw | Remote | Misconfiguration
May 06, 2026 May 06, 2026
May 06, 2026
May 06, 2026
6.0 MEDIUM
CVE-2026-43583 — OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Policy Context in Delivery Queue Reco…

OpenClaw versions 2026.4.10 before 2026.4.14 fail to persist session context during delivery queue recovery for media replay. Attackers can exploit recovered queued outbound media to bypass group too…

openclaw | Remote | Authorization
May 06, 2026 May 06, 2026
May 06, 2026
May 06, 2026
Showing 20 of 5907 Results