Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w8g9-x8gx-crmm | OpenClaw: Strict browser SSRF bypass in Playwright redirect handling leaves private targets reachable |
Thu, 30 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in Playwright redirect handling that allows attackers to bypass strict SSRF checks. Attackers can exploit request-time navigation to reach private targets that should be restricted by browser SSRF protections. | |
| Title | OpenClaw < 2026.4.8 - Strict Browser SSRF Bypass via Playwright Redirect Handling | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-30T12:56:49.919Z
Reserved: 2026-04-27T11:40:07.151Z
Link: CVE-2026-42430
Updated: 2026-04-30T12:56:46.224Z
Status : Analyzed
Published: 2026-04-28T19:37:46.907
Modified: 2026-04-30T14:05:56.300
Link: CVE-2026-42430
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:00:13Z
Github GHSA