CVE-2026-41347 PUBLISHED

OpenClaw < 2026.3.31 - Cross-Site Request Forgery via Missing Browser-Origin Validation in HTTP Operator Endpoints

Assigner: VulnCheck
Reserved: 20.04.2026 Published: 23.04.2026 Updated: 23.04.2026

OpenClaw before 2026.3.31 lacks browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing cross-site request forgery attacks. Attackers can exploit this by sending malicious requests from a browser in trusted-proxy deployments to perform unauthorized actions on HTTP operator endpoints.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CVSS Score: 2.3

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.31 (excl.)
  • Version 2026.3.31 is unaffected

Credits

  • AntAISecurityLab reporter

References

Problem Types

  • CWE-352 Cross-Site Request Forgery (CSRF) CWE