Loopback Protection Bypass in OpenClaw by OpenClaw
CVE-2026-41372

6.9MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
27 April 2026

What is CVE-2026-41372?

OpenClaw versions prior to 2026.4.2 are susceptible to a vulnerability that fails to properly normalize localhost hosts with trailing dots in remote CDP discovery responses. This failure allows attackers to craft malicious discovery responses returning trailing-dot localhost, effectively bypassing loopback protections. Consequently, this could enable attackers to redirect authenticated browser controls towards local endpoints, jeopardizing the security of browser state and exposing sensitive user data.

Affected Version(s)

OpenClaw 0 < 2026.4.2

OpenClaw 2026.4.2

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

smaeljaish771
KeenSecurityLab
.