Skip to content
CVSS 7.7 · HIGH

CVE-2026-42436

OpenClaw before 2026.4.14 contains an improper access control vulnerability in browser snapshot, screenshot, and tab routes that fail to consistently validate the final browser target after navigation. Authenticated callers can bypass SSRF restrictions to expose internal or disallowed page content by exploiting route-driven navigation without proper policy re-validation.

Ver en NVD

Análisis

OpenClaw appears to be a specialized browser-automation or screenshot service rather than widely used infrastructure or dev tooling. The vulnerability allows authenticated SSRF via navigation bypass, which is serious for its users but has a limited impact on the broader developer community.

Severidad

Puntaje: 7.7(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: CHANGED
C: HIGH
I: NONE
A: NONE
Tipo de falla (CWE): CWE-862

EPSS

Probabilidad de explotación (próx. 30 días): 0.0003 (0.0%)
Percentil: 7.5%
EPSS: 2026-05-06

Descripción técnica

OpenClaw before 2026.4.14 contains an improper access control vulnerability in browser snapshot, screenshot, and tab routes that fail to consistently validate the final browser target after navigation. Authenticated callers can bypass SSRF restrictions to expose internal or disallowed page content by exploiting route-driven navigation without proper policy re-validation.

Publicada: 5/5/2026, 12:16:18
Última modificación: 5/5/2026, 19:47:31

Referencias

InicioEventosBlogRecursosEquipo