CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-J4C5-89F5-F3PM
Not Assigned

GHSA-j4c5-89f5-f3pm: Server-Side Request Forgery via CDP Profile Configuration in OpenClaw

Amit Schendel
Amit Schendel
Senior Security Researcher

Apr 26, 2026·5 min read·6 visits

PoC Available

Executive Summary (TL;DR)

A flaw in OpenClaw's configuration parsing merged backend CDP hostnames into the frontend browser navigation allowlist, enabling SSRF bypasses against restricted internal networks.

OpenClaw versions prior to 2026.4.18 are vulnerable to a Server-Side Request Forgery (SSRF) flaw due to improper state merging. The application automatically extracted hostnames defined in Chrome DevTools Protocol (CDP) profile configurations and incorrectly appended them to the global SSRF navigation allowlist. This behavior allowed attackers or malicious configurations to authorize automated browser navigation to restricted internal networks and cloud metadata services.

Vulnerability Overview

OpenClaw provides browser automation capabilities via the Chrome DevTools Protocol (CDP). Administrators configure connection endpoints using the cdpUrl parameter within browser profiles. The application enforces a Server-Side Request Forgery (SSRF) policy to restrict the destinations the browser can navigate to. This mechanism prevents the automated agent from accessing sensitive internal networks or untrusted external domains.

The vulnerability exists in how OpenClaw parses these profile configurations. The application extracts hostnames from all configured CDP profiles and automatically appends them to a global allowlist. This allowlist governs the primary navigation-guard.js component. Consequently, providing a hostname for a CDP connection inadvertently authorizes the browser to navigate to that same host.

This architecture flaw constitutes a Server-Side Request Forgery (CWE-918) vulnerability. An attacker with the ability to define or modify browser profiles can bypass strict-mode SSRF restrictions. The impact is primarily restricted to environments where the AI agent operates alongside sensitive internal services or cloud metadata endpoints.

Root Cause Analysis

The vulnerability stems from an insecure merging of configuration domains. In the affected versions, the application initializes its browser configuration by iterating over all defined user profiles. The function collectConfiguredCdpHostnames systematically gathers every hostname specified in a profile's cdpUrl field.

The flaw materializes when the application constructs the global ssrfPolicy object. The gathered CDP hostnames are passed directly into the resolveBrowserSsrFPolicy function. This function merges the extracted CDP hostnames into the allowedHostnames array, which defines the global navigation boundaries for the browser instance.

The application fails to distinguish between a hostname required for internal CDP connectivity and a hostname authorized for general web navigation. The navigation-guard.js component relies entirely on the allowedHostnames array to authorize requests. Once a hostname enters this array via the CDP configuration, the browser executes navigation requests to that destination without encountering policy violations.

Code Analysis

The vulnerable logic resides in extensions/browser/src/browser/config.ts. The implementation automatically injected the parsed hostnames into the application's global SSRF policy. This action tightly coupled the backend connectivity requirements with the frontend navigation guard.

// Vulnerable implementation in config.ts
function collectConfiguredCdpHostnames(cfg: BrowserConfig | undefined): string[] {
  const hostnames = new Set<string>();
  const addHostnameFromUrl = (rawUrl: string | undefined): void => {
    // Extracts hostname from the raw URL
  };
  addHostnameFromUrl(cfg?.cdpUrl);
  for (const profile of Object.values(cfg?.profiles ?? {})) {
    addHostnameFromUrl(profile?.cdpUrl);
  }
  return Array.from(hostnames);
}
 
// The vulnerability: merging the output into the global policy
ssrfPolicy: resolveBrowserSsrFPolicy(cfg, collectConfiguredCdpHostnames(cfg)),

The remediation strategies implemented in commits e90c89cf8b1459f2aa1f3a665be67392b6c03fdf and 1fd049e3074cac72f6734a7fe88468c84f5f8bd7 correctly decouple these two contexts. The development team removed the global merging behavior from config.ts entirely. The system now initializes the ssrfPolicy without the CDP hostnames.

// Patched implementation in config.ts
- ssrfPolicy: resolveBrowserSsrFPolicy(cfg, collectConfiguredCdpHostnames(cfg)),
+ ssrfPolicy: resolveBrowserSsrFPolicy(cfg),

To maintain necessary backend functionality, the patch introduces a new, specialized policy in extensions/browser/src/browser/cdp-reachability-policy.ts. The resolveCdpReachabilityPolicy function handles CDP health checks independently. This ensures the application can verify CDP connectivity without exposing the destination to the primary browser navigation engine. This architectural split completely neutralizes the attack vector.

Exploitation Methodology

Exploitation requires the attacker to possess configuration privileges or the ability to supply malicious profile definitions to the OpenClaw instance. The attacker initiates the exploit chain by submitting a profile creation payload containing a targeted internal IP address in the cdpUrl field.

A typical payload targets cloud metadata services or internal management interfaces. The attacker submits a JSON structure defining the malicious profile. The backend processes this configuration and silently populates the allowedHostnames array with the target IP address.

{
  "name": "ssrf_bypass_profile",
  "cdpUrl": "http://169.254.169.254"
}

Following profile creation, the attacker interacts with the OpenClaw agent and instructs it to browse the targeted internal resource. The agent issues the navigation request to the embedded browser. The navigation-guard.js component validates the request against the contaminated allowlist, authorizes the transaction, and returns the internal response to the attacker.

Impact Assessment

The primary consequence of this vulnerability is unauthorized access to network resources that are otherwise protected by strict-mode SSRF boundaries. The AI agent acts as a proxy, retrieving and relaying data from internal endpoints. The precise impact depends entirely on the environment hosting the OpenClaw instance.

In cloud environments, this vulnerability permits access to Instance Metadata Services (IMDS). An attacker can direct the agent to navigate to 169.254.169.254 and retrieve sensitive metadata, including temporary IAM credentials. These credentials facilitate lateral movement into the broader cloud infrastructure.

In on-premises or traditional network deployments, the agent can interact with internal web applications, administrative panels, or unauthenticated APIs. The severity of this vulnerability is classified as Low because the attack prerequisites are restrictive. The attacker must already possess administrative control over the application's profile configuration or social engineer an administrator into importing a malicious profile.

Remediation and Mitigation

The complete mitigation for this vulnerability requires upgrading the OpenClaw installation. System administrators must deploy OpenClaw version 2026.4.18 or a subsequent release. This version incorporates the architectural decoupling of the CDP reachability policy and the global SSRF navigation policy.

Organizations that cannot apply the patch immediately must implement compensating controls. Administrators should review the configuration file and enforce strict validation on profile creation. The application must run with dangerouslyAllowPrivateNetwork explicitly set to false to maintain existing SSRF protections.

Security teams should also review the hostnameAllowlist within the ssrfPolicy configuration to ensure only explicitly trusted domains are present. Implementing network-level egress filtering provides an additional defense layer. Configuring the host firewall to block outbound connections from the OpenClaw process to sensitive internal subnets neutralizes the SSRF risk regardless of the application's configuration state.

Official Patches

OpenClawFinal Fix Commit
OpenClawInitial Fix Commit

Fix Analysis (2)

Technical Appendix

CVSS Score
Not Assigned/ 10

Affected Systems

OpenClaw

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenClaw
OpenClaw
< 2026.4.182026.4.18
AttributeDetail
CWE IDCWE-918
Attack VectorNetwork
ImpactSSRF/Bypass
SeverityLow
Exploit StatusProof-of-Concept
KEV StatusNot Listed

MITRE ATT&CK Mapping

T1071.001Application Layer Protocol: Web Protocols
Command and Control
T1571Non-Standard Port
Command and Control
CWE-918
Server-Side Request Forgery (SSRF)

The software does not adequately verify the legitimacy of a given request, leading to Server-Side Request Forgery.

Vulnerability Timeline

Initial fix commit authored
2026-04-17
Refined fix commit authored and OpenClaw version 2026.4.18 released
2026-04-18
Public disclosure via GitHub Advisory
2026-04-21

References & Sources

  • [1]GitHub Advisory Database
  • [2]OpenClaw Documentation
  • [3]Tracking Repository

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.