Impact
OpenClaw before 2026.4.14 has a server‑side request forgery flaw caused by a misconfigured browser SSRF policy that permits navigation to private‑network resources. The flaw can allow an attacker to access internal services or metadata endpoints, potentially exposing sensitive information. This weakness maps to CWE‑1188 and CWE‑918.
Affected Systems
The vulnerability affects OpenClaw installations running versions prior to 2026.4.14, operating on a Node.js environment.
Risk and Exploitability
The CVSS score of 6.3 indicates a moderate severity. The EPSS score is not available, so the current exploitation probability cannot be quantified. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a browser that follows the default SSRF policy, enabling an attacker to trick the server into making requests to internal or metadata endpoints.
OpenCVE Enrichment
Github GHSA