Untriaged
Permalink
CVE-2026-43527
7.7 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
Activity log
- Created suggestion
OpenClaw < 2026.4.14 - Server-Side Request Forgery via Private Network Navigation
OpenClaw before 2026.4.14 contains a server-side request forgery vulnerability in browser SSRF policy that allows private-network navigation by default. Attackers can exploit this misconfiguration to access internal services or metadata endpoints through browser-driven requests.
References
-
GitHub Security Advisory (GHSA-53vx-pmqw-863c) vendor-advisory
-
Patch Commit (1) patch
-
Patch Commit (2) patch
-
Patch Commit (3) patch
-
Patch Commit (4) patch
Affected products
OpenClaw
- ==2026.4.14
- <2026.4.14
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>
-
@mkg20001 Maciej Krüger <mkg20001+nix@gmail.com>