Vulnerability Description
OpenClaw before 2026.4.14 contains a server-side request forgery vulnerability in browser SSRF policy that allows private-network navigation by default. Attackers can exploit this misconfiguration to access internal services or metadata endpoints through browser-driven requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.4.14 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/024f4614a1a1831406e763adc40ef226e3d5Patch
- https://github.com/openclaw/openclaw/commit/1dabfef28db523e7de81edeb3dd689e91712Patch
- https://github.com/openclaw/openclaw/commit/213c36cf51121ef6c05cfccd78037371f968Patch
- https://github.com/openclaw/openclaw/commit/7eecfa411df3d12e6b810e6ca5df47254fc3Patch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-53vx-pmqw-863cVendor Advisory
- https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-prThird Party Advisory
FAQ
What is CVE-2026-43527?
CVE-2026-43527 is a vulnerability with a CVSS score of 7.7 (HIGH). OpenClaw before 2026.4.14 contains a server-side request forgery vulnerability in browser SSRF policy that allows private-network navigation by default. Attackers can exploit this misconfiguration to ...
How severe is CVE-2026-43527?
CVE-2026-43527 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43527?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.