Server-Side Request Forgery Bypass in OpenClaw by OpenClaw
CVE-2026-43573

4.9MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
5 May 2026

What is CVE-2026-43573?

A vulnerability has been identified in OpenClaw prior to version 2026.4.10, which allows attackers to bypass server-side request forgery (SSRF) navigation guards through existing-session browser interaction routes. This can result in unauthorized access to targeted resources, enabling malicious actors to navigate and interact with restricted areas of the application without appropriate policy enforcement.

Affected Version(s)

OpenClaw 0 < 2026.4.10

OpenClaw 2026.4.10

References

CVSS V4

Score:
4.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
qclawer
.