OpenClaw before 2026.4.10 contains a server-side request forgery policy bypass vulnerability in existing-session browser interaction routes. Attackers can bypass SSRF navigation guards to interact with or navigate to unauthorized targets without policy enforcement.
https://github.com/openclaw/openclaw/security/advisories/GHSA-527m-976r-jf79
https://github.com/openclaw/openclaw/commit/daeb74920d5ad986cb600625180037e23221e93a
Published: 2026-05-05
Updated: 2026-05-05
Base Score: 6.8
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N
Severity: Medium
Base Score: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Severity: High
Base Score: 6.3
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
Severity: Medium
EPSS: 0.00027