CVE-2026-42436
Improper Access Control in OpenClaw Browser Snapshot Routes
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.4.14 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not explicitly address how the CVE-2026-42436 vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-42436 is an improper access control vulnerability in OpenClaw versions before 2026.4.14. It affects the browser snapshot, screenshot, and tab routes, which fail to consistently validate the final browser target after navigation.
This flaw allows authenticated users to bypass Server-Side Request Forgery (SSRF) restrictions by exploiting route-driven navigation without proper policy re-validation, potentially exposing internal or disallowed page content.
How can this vulnerability impact me? :
The vulnerability can allow authenticated users to bypass SSRF protections and access internal or restricted page content that should normally be blocked.
This exposure of internal content could lead to unauthorized disclosure of sensitive information within protected environments.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-42436 vulnerability, users should upgrade OpenClaw to version 2026.4.14 or later, where the issue has been fixed.
The fix enforces Server-Side Request Forgery (SSRF) policy validation on browser snapshot, screenshot, and tab routes to prevent unauthorized access to internal or disallowed page content.
Applying this update ensures that URLs accessed during these operations comply with SSRF policies, blocking access to private network addresses and protecting against the vulnerability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves improper access control in OpenClaw versions before 2026.4.14, specifically in browser snapshot, screenshot, and tab routes that fail to consistently validate the final browser target after navigation. Detection would involve verifying if the OpenClaw instance is running a vulnerable version and checking if these routes are accessible and improperly validating SSRF policies.
Since the vulnerability is related to SSRF policy enforcement in OpenClaw, detection can include monitoring for unusual or unauthorized internal network requests initiated via these routes.
No explicit detection commands or scripts are provided in the available resources. However, general steps to detect the vulnerability could include:
- Check the OpenClaw version to confirm if it is prior to 2026.4.14.
- Attempt to access the browser snapshot, screenshot, or tab routes with authenticated credentials and observe if internal or disallowed page content can be retrieved.
- Monitor network traffic for SSRF attempts or unexpected internal network requests originating from OpenClaw.
For example, you might use curl or similar tools to test the routes if you have authentication tokens, but specific commands are not detailed in the provided information.