Impact
OpenClaw versions prior to 2026.4.14 contain an improper access control flaw in the browser snapshot, screenshot, and tab routes. The application fails to consistently validate the final browser target after navigation, allowing authenticated callers to bypass Server Side Request Forgery (SSRF) restrictions. This permits the retrieval of internal or disallowed page content, directly compromising confidentiality for authenticated users and exposing sensitive data.
Affected Systems
The vulnerability affects the OpenClaw application. All installations running any version older than 2026.4.14 are vulnerable. Vendors and administrators should verify that the product is updated to the 2026.4.14 release or newer.
Risk and Exploitability
The CVSS score of 4.9 indicates moderate severity. Because the Exploit Prediction Scoring System (EPSS) score is not available and the CVE is not listed in the CISA Known Exploited Vulnerabilities catalog, the likelihood of widespread exploitation is uncertain. Attackers must be authenticated and capable of issuing requests to the vulnerable routes; there is no known unauthenticated vector. Once authenticated, an attacker can manipulate navigation to target internal resources, resulting in unintentional data exposure.
OpenCVE Enrichment
Github GHSA