CVE-2026-43576
OpenClaw before 2026.4.5 contains a server-side request forgery vulnerability in the CDP /json/version WebSocket endpoint that allows attackers to pivot to untrusted second-hop targets. The webSocketDebuggerUrl response field is not properly validated, enabling attackers to redirect connections to arbitrary hosts and perform SSRF-style attacks.
View on NVDAnalysis
OpenClaw is a niche software project, likely an open-source game engine reimplementation, which is not part of the standard web or mobile development stack. While the SSRF vulnerability in the WebSocket endpoint is high severity, the software lacks the widespread deployment necessary to impact the general MexicoDev community.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NCWE-601CWE-918EPSS
No EPSS score yet (CVE may be too fresh).
Technical description
OpenClaw before 2026.4.5 contains a server-side request forgery vulnerability in the CDP /json/version WebSocket endpoint that allows attackers to pivot to untrusted second-hop targets. The webSocketDebuggerUrl response field is not properly validated, enabling attackers to redirect connections to arbitrary hosts and perform SSRF-style attacks.