Cross-Site Request Forgery in OpenClaw Due to Missing Browser-Origin Validation
CVE-2026-41347

2.3LOW

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41347?

OpenClaw versions prior to 2026.3.31 are susceptible to cross-site request forgery (CSRF) attacks due to the absence of browser-origin validation. This vulnerability arises when the software operates in trusted-proxy mode, allowing attackers to send crafted requests from a web browser to the HTTP operator endpoints. Such actions can lead to unauthorized operations being executed, compromising the integrity of the application. Users should apply the necessary patches to mitigate this risk and ensure secure operations.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

AntAISecurityLab
.