CVE-2026-41297
Server-Side Request Forgery in OpenClaw Marketplace Plugin
Publication date: 2026-04-21
Last updated on: 2026-04-27
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.31 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-41297 is a Server-Side Request Forgery (SSRF) vulnerability in OpenClaw versions before 2026.3.31. It exists in the marketplace plugin's download functionality, specifically in the marketplace.ts module, which does not properly validate or restrict redirect destinations during archive downloads.
Because of this, attackers can exploit unvalidated redirects to make the server send requests to arbitrary internal or external servers, potentially accessing internal resources that should not be reachable.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific detection method or commands provided in the available resources to identify exploitation or presence of this vulnerability on your network or system.
However, since the vulnerability involves unvalidated redirects in the marketplace plugin download functionality, monitoring HTTP requests for unusual or unexpected redirects during archive downloads could be a general approach.
Upgrading to OpenClaw version 2026.3.31 or later is the recommended mitigation to prevent exploitation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how CVE-2026-41297 affects compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability impact me? :
This vulnerability can allow remote attackers to induce the vulnerable server to make unintended requests to internal or external systems. This can lead to unauthorized access to internal resources, potentially exposing sensitive information or enabling further attacks within the internal network.
The SSRF flaw can be leveraged to bypass network restrictions and access services that are otherwise protected, increasing the risk of data leakage or system compromise.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-41297 vulnerability, you should upgrade the OpenClaw package to version 2026.3.31 or later, as this version contains the fix that prevents server-side request forgery by validating and restricting redirect destinations during marketplace plugin archive downloads.
The fix includes multiple safeguards such as validating download redirects, bounding archive downloads, rejecting drive-relative paths, and hardening failure handling to prevent exploitation.