OpenClaw before 2026.4.10 contains a server-side request forgery vulnerability in browser navigation policy that allows attackers to bypass hostname validation through DNS rebinding attacks. Attackers can exploit inconsistent hostname resolution between validation and actual network requests to pivot to internal resources via unallowlisted hostname URLs.
Metrics
Affected Vendors & Products
References
History
Wed, 06 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.10 contains a server-side request forgery vulnerability in browser navigation policy that allows attackers to bypass hostname validation through DNS rebinding attacks. Attackers can exploit inconsistent hostname resolution between validation and actual network requests to pivot to internal resources via unallowlisted hostname URLs. | |
| Title | OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname Validation Bypass | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-367 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-06T19:49:24.759Z
Reserved: 2026-05-01T17:00:54.537Z
Link: CVE-2026-43582
No data.
Status : Awaiting Analysis
Published: 2026-05-06T20:16:34.050
Modified: 2026-05-06T21:20:52.707
Link: CVE-2026-43582
No data.
OpenCVE Enrichment
No data.