Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f7fh-qg34-x2xh | OpenClaw: CDP /json/version WebSocket URL could pivot to untrusted second-hop targets |
Thu, 07 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.5 contains a server-side request forgery vulnerability in the CDP /json/version WebSocket endpoint that allows attackers to pivot to untrusted second-hop targets. The webSocketDebuggerUrl response field is not properly validated, enabling attackers to redirect connections to arbitrary hosts and perform SSRF-style attacks. | |
| Title | OpenClaw < 2026.4.5 - Second-hop SSRF via CDP /json/version WebSocket URL | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-601 CWE-918 |
|
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-07T12:30:31.282Z
Reserved: 2026-05-01T17:00:54.536Z
Link: CVE-2026-43576
Updated: 2026-05-07T12:30:26.954Z
Status : Analyzed
Published: 2026-05-06T20:16:33.240
Modified: 2026-05-07T17:04:04.453
Link: CVE-2026-43576
No data.
OpenCVE Enrichment
Updated: 2026-05-06T22:30:13Z
Github GHSA