Description
OpenClaw before 2026.4.10 contains a server-side request forgery policy bypass vulnerability in existing-session browser interaction routes. Attackers can bypass SSRF navigation guards to interact with or navigate to unauthorized targets without policy enforcement.
Published: 2026-05-05
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw before version 2026.4.10 contains a server‑side request forgery (SSRF) policy bypass in its existing‑session browser interaction routes. This flaw allows an attacker to subvert navigation guards and access or interact with targets that the application normally blocks. The vulnerability does not provide direct code execution, but it enables unauthorized communication with internal or external services that could lead to data leakage or further exploitation. The issue maps to CWE-918 (Server Side Request Forgery) and CWE-862 (Missing Authorization on Sensitive Functions).

Affected Systems

The product affected is OpenClaw, running any version earlier than 2026.4.10. Systems that rely on the existing‑session browser interaction routes are vulnerable.

Risk and Exploitability

The CVSS score of 4.9 classifies the risk as moderate. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no confirmed active exploitation at this time. Based on the description, the likely attack vector is remote: an attacker can send crafted HTTP requests to trigger the SSRF bypass, aligning with CWE-918. The absence of authentication safeguards (CWE-862) further increases the attack potential by allowing unauthenticated interactions with internal resources.

Generated by OpenCVE AI on May 5, 2026 at 13:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.10 or later to eliminate the SSRF policy bypass.
  • If an immediate upgrade is not possible, restrict outbound network destinations from the application to a whitelist of trusted hosts to reduce the attack surface.
  • Implement additional input validation on the SSRF endpoints to reject or sanitize untrusted URLs before processing.
  • Enforce strict authorization checks on SSRF endpoints to mitigate the missing authorization weakness (CWE-862).

Generated by OpenCVE AI on May 5, 2026 at 13:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-527m-976r-jf79 OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement
History

Tue, 05 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 05 May 2026 11:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.10 contains a server-side request forgery policy bypass vulnerability in existing-session browser interaction routes. Attackers can bypass SSRF navigation guards to interact with or navigate to unauthorized targets without policy enforcement.
Title OpenClaw < 2026.4.10 - SSRF Policy Bypass in Existing-Session Browser Interaction Routes
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-862
CWE-918
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}

cvssV4_0

{'score': 4.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-05T14:12:16.685Z

Reserved: 2026-05-01T16:58:23.117Z

Link: CVE-2026-43573

cve-icon Vulnrichment

Updated: 2026-05-05T13:53:02.757Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-05T12:16:21.163

Modified: 2026-05-05T19:32:49.650

Link: CVE-2026-43573

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T14:30:25Z

Weaknesses