CVE-2026-43573
OpenClaw SSRF Policy Bypass via Session Interaction
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.4.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-43573 is a server-side request forgery (SSRF) policy bypass vulnerability found in OpenClaw versions before 2026.4.10. It specifically affects existing-session browser interaction routes, where attackers can bypass SSRF navigation guards. This allows them to interact with or navigate to unauthorized targets without the usual policy enforcement that prevents such actions.
The vulnerability arises because certain navigation or interaction routes during an active session do not apply the SSRF navigation guard, enabling unauthorized access or navigation. The fix involves implementing a three-phase navigation guard and SSRF post-checks to ensure navigation policies are strictly enforced, even when delayed JavaScript redirects occur.
How can this vulnerability impact me? :
This vulnerability can allow attackers to bypass security controls designed to prevent unauthorized server-side requests. By exploiting this SSRF policy bypass, attackers could interact with internal or restricted targets that should normally be inaccessible, potentially leading to unauthorized data access or manipulation.
Because the SSRF navigation guards are bypassed in existing-session browser interactions, attackers might perform actions or navigate to targets without proper authorization checks, increasing the risk of unauthorized access within the affected system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-43573 vulnerability, you should upgrade OpenClaw to version 2026.4.10 or newer, as this version includes the security fix that enforces SSRF navigation guards on existing-session browser interaction routes.
The fix involves implementing a three-phase navigation guard and SSRF post-checks to ensure navigation policies cannot be bypassed by delayed JavaScript redirects or other interaction routes.
Using the latest stable release, such as [email protected], is recommended to ensure all patches and security measures are applied.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the CVE-2026-43573 vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.