Description
OpenClaw before 2026.3.31 lacks browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing cross-site request forgery attacks. Attackers can exploit this by sending malicious requests from a browser in trusted-proxy deployments to perform unauthorized actions on HTTP operator endpoints.
Published: 2026-04-23
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.31 omit browser‑origin checks on HTTP operator endpoints when the application runs in trusted‑proxy mode. This omission permits a Cross‑Site Request Forgery attack in which a malicious web page can cause a victim’s browser to issue authenticated requests to the operator endpoints, enabling unauthorized actions. The flaw is categorized as CWE‑352 and provides attackers with the ability to alter configuration or trigger malicious operations, potentially compromising the integrity of the system.

Affected Systems

All deployments of OpenClaw older than version 2026.3.31 that operate in trusted‑proxy mode are affected, regardless of the operating system or web‑application environment. The vulnerability impacts the HTTP operator API endpoints exposed by the application.

Risk and Exploitability

The CVSS score of 2.3 indicates a low severity vulnerability. The EPSS score of less than 1% suggests a very low likelihood of exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog. Nonetheless, attackers can exploit the flaw by hosting a malicious site that triggers requests from a victim’s browser, making the risk contingent on the underlying trusted‑proxy configuration. Because the vulnerability relies on CSRF from a web browser, it requires user interaction or social engineering to be activated.

Generated by OpenCVE AI on April 28, 2026 at 07:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.31 or later, which restores browser‑origin validation on operator endpoints.
  • If an upgrade cannot be performed immediately, disable the trusted‑proxy mode or restrict operator endpoints to trusted internal networks to reduce the attack surface.
  • Implement additional CSRF safeguards such as synchronizer tokens or same‑origin policies on the operator endpoints to block forged requests.

Generated by OpenCVE AI on April 28, 2026 at 07:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mhr7-2xmv-4c4q OpenClaw: HTTP operator endpoints lack browser-origin validation in trusted-proxy mode
History

Sat, 25 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.31 lacks browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing cross-site request forgery attacks. Attackers can exploit this by sending malicious requests from a browser in trusted-proxy deployments to perform unauthorized actions on HTTP operator endpoints.
Title OpenClaw < 2026.3.31 - Cross-Site Request Forgery via Missing Browser-Origin Validation in HTTP Operator Endpoints
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-352
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-25T01:35:19.694Z

Reserved: 2026-04-20T14:05:09.184Z

Link: CVE-2026-41347

cve-icon Vulnrichment

Updated: 2026-04-25T01:35:15.595Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T22:16:41.483

Modified: 2026-04-28T18:56:34.693

Link: CVE-2026-41347

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:30:26Z

Weaknesses