Impact
The vulnerability in OpenClaw versions prior to 2026.4.8 allows an attacker to trigger Playwright’s redirect handling in a way that circumvents the strict browser‑based SSRF safeguards. By submitting a specially crafted navigation request, an attacker can cause OpenClaw to fetch resources at private or internal addresses that would normally be blocked, enabling potential data exfiltration or lateral movement.
Affected Systems
The flaw affects the OpenClaw OpenClaw application running on Node.js, specifically any deployment using an OpenClaw release older than 2026.4.8. Version information is limited to the major release identifier; later releases (2026.4.8 and beyond) are not impacted.
Risk and Exploitability
With a CVSS score of 4.8 the impact is considered moderate, and the EPSS score is not available, indicating no publicly reported exploitation but no certainty of low risk. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires remote code that can instruct OpenClaw to perform a navigation request; no local privilege escalation or privilege escalation is required. The likely attack vector is remote, leveraging HTTP POST or other request mechanisms to trigger the redirect.
OpenCVE Enrichment