Impact
OpenClaw versions earlier than 2026.4.8 are vulnerable to a server‑side request forgery policy bypass that allows an attacker to trigger navigations through browser interactions. This flaw lets a malicious actor sidestep the normal SSRF checks enforced by the application, enabling them to reach restricted internal endpoints or services that would otherwise be inaccessible from the public network. The impact is a compromise of confidentiality and potential integrity of internal resources accessed through the affected request pathway.
Affected Systems
The affected product is OpenClaw, any deployment of OpenClaw before the 2026.4.8 release. The vulnerability applies to the Node.js implementation of the OpenClaw server and may affect any instance exposing the interaction‑triggered navigation feature.
Risk and Exploitability
The CVSS score of 4.8 indicates a moderate severity, and the exploitability is not publicly documented in the EPSS data. The vulnerability was not listed in CISA’s KEV catalog, suggesting it may not have been widely exploited yet. Based on the description, the likely attack vector is a remote user manipulating a browser session to invoke navigation requests, which the server incorrectly treats as legitimate. Attackers do not need elevated credentials or local access, but must be able to influence the client browser or craft a specially designed request to the vulnerable endpoint.
OpenCVE Enrichment