Skip to content
CVSS 7.7 · HIGH

CVE-2026-42436

OpenClaw before 2026.4.14 contains an improper access control vulnerability in browser snapshot, screenshot, and tab routes that fail to consistently validate the final browser target after navigation. Authenticated callers can bypass SSRF restrictions to expose internal or disallowed page content by exploiting route-driven navigation without proper policy re-validation.

View on NVD

Analysis

OpenClaw appears to be a specialized browser-automation or screenshot service rather than widely used infrastructure or dev tooling. The vulnerability allows authenticated SSRF via navigation bypass, which is serious for its users but has a limited impact on the broader developer community.

Severity

Score: 7.7(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: CHANGED
C: HIGH
I: NONE
A: NONE
Weakness (CWE): CWE-862

EPSS

Probability of exploitation (next 30 days): 0.0003 (0.0%)
Percentile: 7.5%
EPSS: 2026-05-06

Technical description

OpenClaw before 2026.4.14 contains an improper access control vulnerability in browser snapshot, screenshot, and tab routes that fail to consistently validate the final browser target after navigation. Authenticated callers can bypass SSRF restrictions to expose internal or disallowed page content by exploiting route-driven navigation without proper policy re-validation.

Published: 5/5/2026, 12:16:18 PM
Last modified: 5/5/2026, 7:47:31 PM

References

HomeEventsBlogResourcesTeam