Server-Side Request Forgery Vulnerability in OpenClaw by OpenClaw
CVE-2026-42439

4.9MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
5 May 2026

What is CVE-2026-42439?

A server-side request forgery (SSRF) policy bypass vulnerability exists in OpenClaw prior to version 2026.4.10. This flaw allows attackers to circumvent the established SSRF protections by exploiting the /tabs/action endpoint. By manipulating browser tabs action select and close routes, unauthorized navigation actions can be executed, potentially leading to unauthorized access or data exfiltration. Users of earlier versions are advised to upgrade to the latest version to mitigate this vulnerability.

Affected Version(s)

OpenClaw 0 < 2026.4.10

OpenClaw 2026.4.10

References

CVSS V4

Score:
4.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nicky (@nicky-cc)
.