SB2026043087 - Multiple vulnerabilities in OpenClaw



SB2026043087 - Multiple vulnerabilities in OpenClaw

Published: April 30, 2026

Security Bulletin ID SB2026043087
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Server-Side Request Forgery (SSRF) (CVE-ID: N/A)

The vulnerability allows a remote user to perform a server-side request forgery-style pivot to untrusted second-hop targets.

The vulnerability exists due to improper restriction of outbound connection targets in the CDP /json/version WebSocket URL handling when processing a /json/version response containing a webSocketDebuggerUrl that points to a different host. A remote user can supply a crafted response to perform a server-side request forgery-style pivot to untrusted second-hop targets.


2) Path traversal (CVE-ID: N/A)

The vulnerability allows a remote attacker to access files outside the expected repository root.

The vulnerability exists due to path traversal in remote marketplace plugin repository handling when accepting marketplace path sources that resolve through symlinks. A remote attacker can provide a crafted repository path to access files outside the expected repository root.


Remediation

Install update from vendor's website.