Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3fqr-4cg8-h96q | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints |
Thu, 26 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
Fri, 20 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw clawdbot Openclaw openclaw |
|
| Vendors & Products |
Openclaw
Openclaw clawdbot Openclaw openclaw |
Thu, 19 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw is a personal AI assistant. Prior to 2026.2.14, browser-facing localhost mutation routes accepted cross-origin browser requests without explicit Origin/Referer validation. Loopback binding reduces remote exposure but does not prevent browser-initiated requests from malicious origins. A malicious website can trigger unauthorized state changes against a victim's local OpenClaw browser control plane (for example opening tabs, starting/stopping the browser, mutating storage/cookies) if the browser control service is reachable on loopback in the victim's browser context. Starting in version 2026.2.14, mutating HTTP methods (POST/PUT/PATCH/DELETE) are rejected when the request indicates a non-loopback Origin/Referer (or `Sec-Fetch-Site: cross-site`). Other mitigations include enabling browser control auth (token/password) and avoid running with auth disabled. | |
| Title | OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T15:41:39.603Z
Reserved: 2026-02-13T16:27:51.807Z
Link: CVE-2026-26317
Updated: 2026-02-20T15:27:33.425Z
Status : Analyzed
Published: 2026-02-19T22:16:47.270
Modified: 2026-02-26T18:39:50.060
Link: CVE-2026-26317
No data.
OpenCVE Enrichment
Updated: 2026-04-18T11:45:44Z
Github GHSA