Impact
OpenClaw versions prior to 2026.4.10 have a server‑side request forgery flaw in the /tabs/action endpoint that lets an attacker bypass the configured browser SSRF policy and perform unauthorized tab navigation operations. The vulnerability is a missing authorization weakness (CWE‑862), allowing an attacker to direct the application to access URLs that should be blocked by the policy. This could lead to the internal network being accessed or the application performing unintended actions on behalf of the attacker.
Affected Systems
OpenClaw software before version 2026.4.10, specifically the browser tabs action select and close routes, is affected.
Risk and Exploitability
The CVSS score of 4.9 indicates moderate severity. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, suggesting limited public exploitation data. The likely attack vector is external, where an attacker crafts a request to the /tabs/action endpoint to exploit the SSRF policy bypass. Exploitation requires that the application’s SSRF policy be configured, but the flaw disables those controls, enabling the attacker to target internal resources.
OpenCVE Enrichment
Github GHSA