Impact
OpenClaw before 2026.4.5 contains a server‑side request forgery flaw in the CDP /json/version WebSocket endpoint. The webSocketDebuggerUrl response field is not validated, permitting an attacker to redirect the WebSocket connection to an arbitrary host and carry out server‑side request forgery in a second hop. This vulnerability can lead to confidential data exposure, manipulation of internal resources, or further compromise of downstream services, as demonstrated by the CWE‑601 and CWE‑918 weaknesses.
Affected Systems
The vulnerability affects the OpenClaw application distributed by OpenClaw. All releases prior to version 2026.4.5 are impacted. No other product versions are known to be affected.
Risk and Exploitability
The CVSS base score of 4.9 indicates moderate impact; the EPSS score is not available, so current likelihood is unknown. The vulnerability is not listed in the CISA KEV catalog. Attackers would typically target the CDP /json/version endpoint from within the same network or through a compromised client to redirect the debugger connection to a chosen second‑hop host. Successful exploitation requires the ability to receive the WebSocket response and then process the redirected URL, which is feasible for unauthenticated or low‑privilege users once the endpoint is exposed.
OpenCVE Enrichment