Server-Side Request Forgery (SSRF) in OpenClaw - #VU128593
Published: April 30, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to perform a server-side request forgery-style pivot to untrusted second-hop targets.
The vulnerability exists due to improper restriction of outbound connection targets in the CDP /json/version WebSocket URL handling when processing a /json/version response containing a webSocketDebuggerUrl that points to a different host. A remote user can supply a crafted response to perform a server-side request forgery-style pivot to untrusted second-hop targets.