Impact
OpenClaw versions prior to 2026.4.20 contain a flaw that allows a malicious user to create browser CDP profiles which bypass the application’s strict‑mode Server‑Side Request Forgery policy. An attacker can store a profile that points to a private‑network or metadata endpoint; when the application later checks the status of that profile, it will automatically send a request to the attacker‑controlled URL. The result is that internal services or data can be accessed or exfiltrated, representing a classic Server‑Side Request Forgery weakness (CWE‑918).
Affected Systems
Vendors affected are OpenClaw, specifically the OpenClaw application. All releases before 2026.4.20 are vulnerable. The vulnerability is present in the Node.js‑based code base and is mitigated in the 2026.4.20 release brought in by the identified commits.
Risk and Exploitability
The CVSS score of 2.3 indicates a low‑severity baseline. EPSS is not available and the vulnerability is not listed in CISA’s KEV catalog, suggesting limited public exploitation. The attack vector is inferred to be through the profile creation interface that accepts arbitrary URLs, potentially requiring authenticated access to that interface. Once a malicious profile is stored, the application automatically probes it during normal status operations, providing a persistent exploitation vector with moderate feasibility but low initial impact rating.
OpenCVE Enrichment