Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-918 |
Fri, 24 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.28 contains an SSRF guard bypass vulnerability that fails to block four IPv6 special-use ranges. Attackers can exploit this by crafting URLs targeting internal or non-routable IPv6 addresses to bypass SSRF protections. | |
| Title | OpenClaw < 2026.3.28 - SSRF Guard Bypass via IPv6 Special-Use Ranges | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-184 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-24T14:08:10.160Z
Reserved: 2026-04-20T14:09:02.629Z
Link: CVE-2026-41361
Updated: 2026-04-24T14:07:55.574Z
Status : Analyzed
Published: 2026-04-23T22:16:43.870
Modified: 2026-04-29T14:08:18.713
Link: CVE-2026-41361
No data.
OpenCVE Enrichment
Updated: 2026-04-29T17:30:16Z