Description
OpenClaw before 2026.4.10 contains a server-side request forgery vulnerability in browser navigation policy that allows attackers to bypass hostname validation through DNS rebinding attacks. Attackers can exploit inconsistent hostname resolution between validation and actual network requests to pivot to internal resources via unallowlisted hostname URLs.
Published: 2026-05-06
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw versions prior to 2026.4.10 allow an attacker to perform DNS rebinding attacks that bypass hostname validation in the browser navigation policy, enabling server-side request forgery (SSRF). By exploiting inconsistent hostname resolution between the validation phase and the actual network request, an attacker can direct requests to internal resources that are normally excluded from external access. This flaw can expose sensitive internal data or services, compromising confidentiality and potentially availability of internal resources.

Affected Systems

The vulnerability affects the OpenClaw product from the vendor OpenClaw. All releases dated earlier than 2026.4.10 are impacted. No specific sub-versions are listed beyond the general version threshold.

Risk and Exploitability

The CVSS score of 4.9 reflects moderate risk; the EPSS score is currently not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no widespread exploitation has been reported yet. The likely attack vector requires the attacker to control a domain that can perform DNS rebinding and to have the victim’s browser navigate to URLs that trigger the validation bypass. Once the attacker succeeds, they can pivot to internal network addresses behind the web server, potentially extracting data or accessing services. The exploitation conditions do not require elevated privileges on the target system, and the attack can be initiated from any external network if the necessary domain control and browser interaction are achieved.

Generated by OpenCVE AI on May 6, 2026 at 21:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.4.10 or later to remove the SSRF flaw.
  • Restrict the web server’s outbound traffic in the network firewall so that it cannot reach internal hostnames or addresses accessible only through internal routes.
  • Implement strict hostname validation or an allowlist in the application’s navigation policy to prevent future rebinding based bypasses (ensure all hostnames used by the server match an approved list).

Generated by OpenCVE AI on May 6, 2026 at 21:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.10 contains a server-side request forgery vulnerability in browser navigation policy that allows attackers to bypass hostname validation through DNS rebinding attacks. Attackers can exploit inconsistent hostname resolution between validation and actual network requests to pivot to internal resources via unallowlisted hostname URLs.
Title OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname Validation Bypass
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-367
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}

cvssV4_0

{'score': 4.9, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-07T12:32:09.498Z

Reserved: 2026-05-01T17:00:54.537Z

Link: CVE-2026-43582

cve-icon Vulnrichment

Updated: 2026-05-07T12:31:56.234Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T20:16:34.050

Modified: 2026-05-06T21:20:52.707

Link: CVE-2026-43582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T00:15:05Z

Weaknesses