Impact
OpenClaw versions prior to 2026.4.10 contain an incomplete navigation guard that allows navigation actions to be initiated without the full Server‑Side Request Forgery policy being applied. Browser‑based interactions such as pressKey events and type submit flows can bypass the post‑action security checks, leading the application to navigate to unintended or internal URLs without verification.
Affected Systems
The affected vendor is OpenClaw and the product is the OpenClaw application built on Node.js. All releases before version 2026.4.10 are impacted, irrespective of deployment environment. Updating to any release 2026.4.10 or newer eliminates the issue.
Risk and Exploitability
The CVSS score for this vulnerability is 4.9, indicating a moderate severity. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a browser context where an attacker can provide input that triggers pressKey or type submit events, requiring UI interactions that expose untrusted input to the application. Exploitation is limited to environments that expose such UI flows, and there are no documented public exploits at this time.
OpenCVE Enrichment