Impact
OpenClaw before version 2026.4.10 contains a server‑side request forgery (SSRF) policy bypass in its existing‑session browser interaction routes. This flaw allows an attacker to subvert navigation guards and access or interact with targets that the application normally blocks. The vulnerability does not provide direct code execution, but it enables unauthorized communication with internal or external services that could lead to data leakage or further exploitation. The issue maps to CWE-918 (Server Side Request Forgery) and CWE-862 (Missing Authorization on Sensitive Functions).
Affected Systems
The product affected is OpenClaw, running any version earlier than 2026.4.10. Systems that rely on the existing‑session browser interaction routes are vulnerable.
Risk and Exploitability
The CVSS score of 4.9 classifies the risk as moderate. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no confirmed active exploitation at this time. Based on the description, the likely attack vector is remote: an attacker can send crafted HTTP requests to trigger the SSRF bypass, aligning with CWE-918. The absence of authentication safeguards (CWE-862) further increases the attack potential by allowing unauthenticated interactions with internal resources.
OpenCVE Enrichment
Github GHSA