[인터넷보호나라 KrCERT 보안공지] OpenClaw 제품 보안 업데이트 권고

□ 개요
o OpenClaw社는 자사 제품에서 발생하는 취약점을 해결한 보안 업데이트 발표 [1]~[22]
o 영향을 받는 버전을 사용 중인 사용자는 해결 방안에 따라 최신 버전으로 업데이트 권고

□ 설명
o OpenClaw에서 발생하는 Missing Authorization 취약점(CVE-2026-22172) [1][23]
o OpenClaw에서 발생하는 Incomplete List of Disallowed Inputs 취약점(CVE-2026-28363) [2][24]
o OpenClaw에서 발생하는 OS Command Injection 취약점(CVE-2026-28391) [3][25]
o OpenClaw에서 발생하는 Incorrect Implementation of Authentication Algorithm 취약점(CVE-2026-28446) [4][26]
o OpenClaw에서 발생하는 Incorrect Authorization 취약점(CVE-2026-28466) [5][27]
o OpenClaw에서 발생하는 OS Command Injection 취약점(CVE-2026-28470) [6][28]
o OpenClaw에서 발생하는 Missing Authentication for Critical Function 취약점(CVE-2026-28472) [7][29]
o OpenClaw Nextcloud Talk Plugin에서 발생하는 Incorrect Authorization 취약점(CVE-2026-28474) [8][30]
o OpenClaw Agent Platform에서 발생하는 Code Injection 취약점(CVE-2026-30741) [9][31]
o OpenClaw에서 발생하는 Improper Access Control 취약점(CVE-2026-32038) [10][32]
o OpenClaw에서 발생하는 Insufficiently Protected Credentials 취약점(CVE-2026-32913) [11][33]
o OpenClaw에서 발생하는 Incorrect Authorization 취약점(CVE-2026-32915) [12][34]
o OpenClaw에서 발생하는 Incorrect Privilege Assignment 취약점(CVE-2026-32916) [13][35]
o OpenClaw에서 발생하는 OS Command Injection 취약점(CVE-2026-32917) [14][36]
o OpenClaw에서 발생하는 Incorrect Authorization 취약점(CVE-2026-32918) [15][37]
o OpenClaw에서 발생하는 Incorrect Privilege Assignment 취약점(CVE-2026-32922) [16][38]
o OpenClaw에서 발생하는 Incorrect Authorization 취약점(CVE-2026-32924) [17][39]
o OpenClaw에서 발생하는 Permissive Regular Expression 취약점(CVE-2026-32973) [18][40]
o OpenClaw에서 발생하는 Reliance on Untrusted Inputs in a Security Decision 취약점(CVE-2026-32975) [19][41]
o OpenClaw에서 발생하는 Incorrect Authorization 취약점(CVE-2026-32978) [20][42]
o OpenClaw에서 발생하는 Authentication Bypass by Capture-replay 취약점(CVE-2026-32987) [21][43]
o OpenClaw에서 발생하는 Incorrect Authorization 취약점(CVE-2026-33579) [22][44]

□ 영향을 받는 제품 및 해결 방안
취약점 제품명 영향받는 버전 해결 버전
CVE-2026-22172 openclaw 2026.3.11 이하 2026.3.12
CVE-2026-28363 openclaw 2026.2.22-2 이하 2026.2.23 이상
CVE-2026-28391 openclaw 2026.2.1 이하 2026.2.2 이상
CVE-2026-28446 openclaw 2026.2.1 이하 2026.2.2 이상
CVE-2026-28466 openclaw 2026.2.14 미만 2026.2.14 이상
CVE-2026-28470 openclaw 2026.2.1 이하 2026.2.2 이상
CVE-2026-28472 openclaw 2026.2.1 이하 2026.2.2 이상
CVE-2026-28474 nextcloud-talk 2026.2.2 이하 2026.2.6 이상
CVE-2026-30741 OpenClaw Agent Platform 2026.2.6 이하 2026.2.6 이상
CVE-2026-32038 openclaw 2026.2.23 이하 2026.2.24 이상
CVE-2026-32913 openclaw 2026.3.2 이하 2026.3.7 이상
CVE-2026-32915 openclaw 2026.3.8 이하 2026.3.11
CVE-2026-32916 openclaw 2026.3.7 이상 ~ 2026.3.11 미만 2026.3.11
CVE-2026-32917 openclaw 2026.3.12 이하 2026.3.13 이상
CVE-2026-32918 openclaw 2026.3.8 이하 2026.3.11
CVE-2026-32922 openclaw 2026.3.8 이하 2026.3.11
CVE-2026-32924 openclaw 2026.3.11 이하 2026.3.12
CVE-2026-32973 openclaw 2026.3.8 이하 2026.3.11
CVE-2026-32975 openclaw 2026.3.11 이하 2026.3.12
CVE-2026-32978 openclaw 2026.3.11 미만 2026.3.11
CVE-2026-32987 openclaw 2026.3.12 이하 2026.3.13 이상
CVE-2026-33579 openclaw 2026.3.24 이하 2026.3.28 이상
※ 하단의 참고 사이트를 확인하여 업데이트 수행 [1]~[22]

□ 참고사이트
[1] https://github.com/openclaw/openclaw/security/advisories/GHSA-rqpp-rjj8-7wv8
[2] https://github.com/openclaw/openclaw/security/advisories/GHSA-3c6h-g97w-fg78
[3] https://github.com/openclaw/openclaw/security/advisories/GHSA-qj77-c3c8-9c3q
[4] https://github.com/openclaw/openclaw/security/advisories/GHSA-4rj2-gpmh-qq5x
[5] https://github.com/openclaw/openclaw/security/advisories/GHSA-gv46-4xfq-jv58
[6] https://github.com/openclaw/openclaw/security/advisories/GHSA-3hcm-ggvf-rch5
[7] https://github.com/openclaw/openclaw/security/advisories/GHSA-rv39-79c4-7459
[8] https://github.com/openclaw/openclaw/security/advisories/GHSA-r5h9-vjqc-hq3r
[9] https://github.com/advisories/GHSA-rvp5-mqmc-q4g6
[10] https://github.com/openclaw/openclaw/security/advisories/GHSA-ww6v-v748-x7g9
[11] https://github.com/openclaw/openclaw/security/advisories/GHSA-6mgf-v5j7-45cr
[12] https://github.com/openclaw/openclaw/security/advisories/GHSA-4w7m-58cg-cmff
[13] https://github.com/openclaw/openclaw/security/advisories/GHSA-xw77-45gv-p728
[14] https://github.com/openclaw/openclaw/security/advisories/GHSA-g2f6-pwvx-r275
[15] https://github.com/openclaw/openclaw/security/advisories/GHSA-wcxr-59v9-rxr8
[16] https://github.com/openclaw/openclaw/security/advisories/GHSA-4jpw-hj22-2xmc
[17] https://github.com/openclaw/openclaw/security/advisories/GHSA-m69h-jm2f-2pv8
[18] https://github.com/openclaw/openclaw/security/advisories/GHSA-f8r2-vg7x-gh8m
[19] https://github.com/openclaw/openclaw/security/advisories/GHSA-f5mf-3r52-r83w
[20] https://github.com/openclaw/openclaw/security/advisories/GHSA-qc36-x95h-7j53
[21] https://github.com/openclaw/openclaw/security/advisories/GHSA-63f5-hhc7-cx6p
[22] https://github.com/openclaw/openclaw/security/advisories/GHSA-hc5h-pmr3-3497
[23] https://nvd.nist.gov/vuln/detail/CVE-2026-22172
[24] https://nvd.nist.gov/vuln/detail/CVE-2026-28363
[25] https://nvd.nist.gov/vuln/detail/CVE-2026-28391
[26] https://nvd.nist.gov/vuln/detail/CVE-2026-28446
[27] https://nvd.nist.gov/vuln/detail/CVE-2026-28466
[28] https://nvd.nist.gov/vuln/detail/CVE-2026-28470
[29] https://nvd.nist.gov/vuln/detail/CVE-2026-28472
[30] https://nvd.nist.gov/vuln/detail/CVE-2026-28474
[31] https://nvd.nist.gov/vuln/detail/CVE-2026-30741
[32] https://nvd.nist.gov/vuln/detail/CVE-2026-32038
[33] https://nvd.nist.gov/vuln/detail/CVE-2026-32913
[34] https://nvd.nist.gov/vuln/detail/CVE-2026-32915
[35] https://nvd.nist.gov/vuln/detail/CVE-2026-32916
[36] https://nvd.nist.gov/vuln/detail/CVE-2026-32917
[37] https://nvd.nist.gov/vuln/detail/CVE-2026-32918
[38] https://nvd.nist.gov/vuln/detail/CVE-2026-32922
[39] https://nvd.nist.gov/vuln/detail/CVE-2026-32924
[40] https://nvd.nist.gov/vuln/detail/CVE-2026-32973
[41] https://nvd.nist.gov/vuln/detail/CVE-2026-32975
[42] https://nvd.nist.gov/vuln/detail/CVE-2026-32978
[43] https://nvd.nist.gov/vuln/detail/CVE-2026-32987
[44] https://nvd.nist.gov/vuln/detail/CVE-2026-33579

□ 문의사항
o 한국인터넷진흥원 사이버민원센터 : 국번없이 118

□ 작성 : 위협대응단 AI취약점대응팀

<구체적인 내용이나 첨부파일은 아래 [인터넷보호나라 KrCERT 보안공지] 사이트의 글에서 확인하시기 바랍니다.>