CVE-2026-43573
Undergoing Analysis Undergoing Analysis - In Progress
OpenClaw SSRF Policy Bypass via Session Interaction

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: VulnCheck

Description
OpenClaw before 2026.4.10 contains a server-side request forgery policy bypass vulnerability in existing-session browser interaction routes. Attackers can bypass SSRF navigation guards to interact with or navigate to unauthorized targets without policy enforcement.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.4.10 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-43573 is a server-side request forgery (SSRF) policy bypass vulnerability found in OpenClaw versions before 2026.4.10. It specifically affects existing-session browser interaction routes, where attackers can bypass SSRF navigation guards. This allows them to interact with or navigate to unauthorized targets without the usual policy enforcement that prevents such actions.

The vulnerability arises because certain navigation or interaction routes during an active session do not apply the SSRF navigation guard, enabling unauthorized access or navigation. The fix involves implementing a three-phase navigation guard and SSRF post-checks to ensure navigation policies are strictly enforced, even when delayed JavaScript redirects occur.


How can this vulnerability impact me? :

This vulnerability can allow attackers to bypass security controls designed to prevent unauthorized server-side requests. By exploiting this SSRF policy bypass, attackers could interact with internal or restricted targets that should normally be inaccessible, potentially leading to unauthorized data access or manipulation.

Because the SSRF navigation guards are bypassed in existing-session browser interactions, attackers might perform actions or navigate to targets without proper authorization checks, increasing the risk of unauthorized access within the affected system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-43573 vulnerability, you should upgrade OpenClaw to version 2026.4.10 or newer, as this version includes the security fix that enforces SSRF navigation guards on existing-session browser interaction routes.

The fix involves implementing a three-phase navigation guard and SSRF post-checks to ensure navigation policies cannot be bypassed by delayed JavaScript redirects or other interaction routes.

Using the latest stable release, such as [email protected], is recommended to ensure all patches and security measures are applied.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the CVE-2026-43573 vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart