OpenClaw before 2026.4.10 contains a server-side request forgery vulnerability in browser navigation policy that allows attackers to bypass hostname validation through DNS rebinding attacks. Attackers can exploit inconsistent hostname resolution between validation and actual network requests to pivot to internal resources via unallowlisted hostname URLs.
https://www.vulncheck.com/advisories/openclaw-dns-rebinding-ssrf-via-hostname-validation-bypass
https://github.com/openclaw/openclaw/security/advisories/GHSA-xq94-r468-qwgj
https://github.com/openclaw/openclaw/commit/121c452d666d4749744dc2089287d0227aae2ed3
Published: 2026-05-06
Updated: 2026-05-06
Base Score: 4.9
Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:N/A:N
Severity: Medium
Base Score: 6.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Severity: Medium
Base Score: 4.9
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
Severity: Medium