CVE-2026-43576 PUBLISHED

OpenClaw < 2026.4.5 - Second-hop SSRF via CDP /json/version WebSocket URL

Assigner: VulnCheck
Reserved: 01.05.2026 Published: 06.05.2026 Updated: 06.05.2026

OpenClaw before 2026.4.5 contains a server-side request forgery vulnerability in the CDP /json/version WebSocket endpoint that allows attackers to pivot to untrusted second-hop targets. The webSocketDebuggerUrl response field is not properly validated, enabling attackers to redirect connections to arbitrary hosts and perform SSRF-style attacks.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
CVSS Score: 4.9

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.4.5 (excl.)
  • Version 2026.4.5 is unaffected

Credits

  • Nicky (@nicky-cc) reporter

References

Problem Types

  • CWE-601 URL Redirection to Untrusted Site ('Open Redirect') CWE
  • CWE-918 Server-Side Request Forgery (SSRF) CWE