U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-43527 Detail

Description

OpenClaw before 2026.4.14 contains a server-side request forgery vulnerability in browser SSRF policy that allows private-network navigation by default. Attackers can exploit this misconfiguration to access internal services or metadata endpoints through browser-driven requests.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

Nist CVSS score does not match with CNA score
CNA:  VulnCheck
CVSS-B 6.3 MEDIUM
Vector:  CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://github.com/openclaw/openclaw/commit/024f4614a1a1831406e763adc40ef226e3d5e9ed VulnCheck
https://github.com/openclaw/openclaw/commit/1dabfef28db523e7de81edeb3dd689e9171236a2 VulnCheck
https://github.com/openclaw/openclaw/commit/213c36cf51121ef6c05cfccd78037371f968f31a VulnCheck
https://github.com/openclaw/openclaw/commit/7eecfa411df3d12e6b810e6ca5df47254fc3db3f VulnCheck
https://github.com/openclaw/openclaw/security/advisories/GHSA-53vx-pmqw-863c VulnCheck
https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-private-network-navigation VulnCheck

Weakness Enumeration

CWE-ID CWE Name Source
CWE-918 Server-Side Request Forgery (SSRF) VulnCheck  
CWE-1188 Insecure Default Initialization of Resource VulnCheck  

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-43527
NVD Published Date:
05/05/2026
NVD Last Modified:
05/05/2026
Source:
VulnCheck