Impact
OpenClaw versions prior to 2026.4.10 allow an attacker to perform DNS rebinding attacks that bypass hostname validation in the browser navigation policy, enabling server-side request forgery (SSRF). By exploiting inconsistent hostname resolution between the validation phase and the actual network request, an attacker can direct requests to internal resources that are normally excluded from external access. This flaw can expose sensitive internal data or services, compromising confidentiality and potentially availability of internal resources.
Affected Systems
The vulnerability affects the OpenClaw product from the vendor OpenClaw. All releases dated earlier than 2026.4.10 are impacted. No specific sub-versions are listed beyond the general version threshold.
Risk and Exploitability
The CVSS score of 4.9 reflects moderate risk; the EPSS score is currently not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no widespread exploitation has been reported yet. The likely attack vector requires the attacker to control a domain that can perform DNS rebinding and to have the victim’s browser navigate to URLs that trigger the validation bypass. Once the attacker succeeds, they can pivot to internal network addresses behind the web server, potentially extracting data or accessing services. The exploitation conditions do not require elevated privileges on the target system, and the attack can be initiated from any external network if the necessary domain control and browser interaction are achieved.
OpenCVE Enrichment