Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-41297 (GCVE-0-2026-41297)
Vulnerability from cvelistv5 – Published: 2026-04-20 23:08 – Updated: 2026-04-21 13:41 X_Open Source
VLAI?
EPSS
Title
OpenClaw < 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect
Summary
OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive downloads, enabling remote attackers to redirect requests to arbitrary internal or external servers.
Severity ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
3 references
| URL | Tags |
|---|---|
| https://github.com/openclaw/openclaw/security/adv… | vendor-advisory |
| https://github.com/openclaw/openclaw/commit/2ce44… | patch |
| https://www.vulncheck.com/advisories/openclaw-ser… | third-party-advisory |
Impacted products
Date Public ?
2026-03-31 00:00
Credits
AntAISecurityLab
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-41297",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-21T13:41:27.957659Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-21T13:41:34.057Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageURL": "pkg:npm/openclaw",
"product": "OpenClaw",
"vendor": "OpenClaw",
"versions": [
{
"lessThan": "2026.3.31",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2026.3.31",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "2026.3.31",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "AntAISecurityLab"
}
],
"datePublic": "2026-03-31T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive downloads, enabling remote attackers to redirect requests to arbitrary internal or external servers."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:N/SC:H/SI:L/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918 Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-20T23:08:10.955Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "GitHub Security Advisory (GHSA-vjx8-8p7h-82gr)",
"tags": [
"vendor-advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vjx8-8p7h-82gr"
},
{
"name": "Patch Commit",
"tags": [
"patch"
],
"url": "https://github.com/openclaw/openclaw/commit/2ce44ca6a1302b166a128abbd78f72114f2f4f52"
},
{
"name": "VulnCheck Advisory: OpenClaw \u003c 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-marketplace-plugin-download-redirect"
}
],
"tags": [
"x_open-source"
],
"title": "OpenClaw \u003c 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2026-41297",
"datePublished": "2026-04-20T23:08:10.955Z",
"dateReserved": "2026-04-20T14:01:13.151Z",
"dateUpdated": "2026-04-21T13:41:34.057Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-41297",
"date": "2026-05-21",
"epss": "0.00037",
"percentile": "0.11006"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-41297\",\"sourceIdentifier\":\"disclosure@vulncheck.com\",\"published\":\"2026-04-21T00:16:30.163\",\"lastModified\":\"2026-04-27T15:05:17.153\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive downloads, enabling remote attackers to redirect requests to arbitrary internal or external servers.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"HIGH\",\"subIntegrityImpact\":\"LOW\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"2026.3.31\",\"matchCriteriaId\":\"35B1FB5C-EA5A-4095-9226-F947A9B3B984\"}]}]}],\"references\":[{\"url\":\"https://github.com/openclaw/openclaw/commit/2ce44ca6a1302b166a128abbd78f72114f2f4f52\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openclaw/openclaw/security/advisories/GHSA-vjx8-8p7h-82gr\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-marketplace-plugin-download-redirect\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-41297\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-21T13:41:27.957659Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-21T13:41:30.720Z\"}}], \"cna\": {\"tags\": [\"x_open-source\"], \"title\": \"OpenClaw \u003c 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"AntAISecurityLab\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 4.8, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:N/SC:H/SI:L/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"LOW\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"OpenClaw\", \"product\": \"OpenClaw\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2026.3.31\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"2026.3.31\", \"versionType\": \"semver\"}], \"packageURL\": \"pkg:npm/openclaw\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-03-31T00:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/openclaw/openclaw/security/advisories/GHSA-vjx8-8p7h-82gr\", \"name\": \"GitHub Security Advisory (GHSA-vjx8-8p7h-82gr)\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/openclaw/openclaw/commit/2ce44ca6a1302b166a128abbd78f72114f2f4f52\", \"name\": \"Patch Commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-marketplace-plugin-download-redirect\", \"name\": \"VulnCheck Advisory: OpenClaw \u003c 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirect\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"vulncheck\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive downloads, enabling remote attackers to redirect requests to arbitrary internal or external servers.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918 Server-Side Request Forgery (SSRF)\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"2026.3.31\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"shortName\": \"VulnCheck\", \"dateUpdated\": \"2026-04-20T23:08:10.955Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-41297\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-21T13:41:34.057Z\", \"dateReserved\": \"2026-04-20T14:01:13.151Z\", \"assignerOrgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"datePublished\": \"2026-04-20T23:08:10.955Z\", \"assignerShortName\": \"VulnCheck\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-41297
Vulnerability from fkie_nvd - Published: 2026-04-21 00:16 - Updated: 2026-04-27 15:05
Severity ?
Summary
OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive downloads, enabling remote attackers to redirect requests to arbitrary internal or external servers.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "35B1FB5C-EA5A-4095-9226-F947A9B3B984",
"versionEndExcluding": "2026.3.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The marketplace.ts module fails to restrict redirect destinations during archive downloads, enabling remote attackers to redirect requests to arbitrary internal or external servers."
}
],
"id": "CVE-2026-41297",
"lastModified": "2026-04-27T15:05:17.153",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 4.7,
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-04-21T00:16:30.163",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Patch"
],
"url": "https://github.com/openclaw/openclaw/commit/2ce44ca6a1302b166a128abbd78f72114f2f4f52"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vjx8-8p7h-82gr"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-marketplace-plugin-download-redirect"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
]
}
GHSA-VJX8-8P7H-82GR
Vulnerability from github – Published: 2026-04-07 18:10 – Updated: 2026-04-24 21:04
VLAI?
Summary
OpenClaw: Marketplace Plugin Download Follows Redirects Without SSRF Protection
Details
Summary
Marketplace Plugin Download Follows Redirects Without SSRF Protection
Current Maintainer Triage
- Status: open
- Normalized severity: medium
- Assessment: v2026.3.28 still uses bare redirect-following fetch in src/plugins/marketplace.ts for marketplace archives, and fixed-on-main only does not change that shipped SSRF exposure.
Affected Packages / Versions
- Package:
openclaw(npm) - Latest published npm version:
2026.3.31 - Vulnerable version range:
<=2026.3.28 - Patched versions:
>= 2026.3.31 - First stable tag containing the fix:
v2026.3.31
Fix Commit(s)
2ce44ca6a1302b166a128abbd78f72114f2f4f52— 2026-03-31T12:59:42+01:00
Release Process Note
- The fix is already present in released version
2026.3.31. - This draft looks ready for final maintainer disposition or publication, not additional code-fix work.
Thanks @AntAISecurityLab for reporting.
Severity ?
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2026.3.28"
},
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.3.31"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-41297"
],
"database_specific": {
"cwe_ids": [
"CWE-918"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-07T18:10:45Z",
"nvd_published_at": "2026-04-21T00:16:30Z",
"severity": "MODERATE"
},
"details": "## Summary\nMarketplace Plugin Download Follows Redirects Without SSRF Protection\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: v2026.3.28 still uses bare redirect-following fetch in src/plugins/marketplace.ts for marketplace archives, and fixed-on-main only does not change that shipped SSRF exposure.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `2026.3.31`\n- Vulnerable version range: `\u003c=2026.3.28`\n- Patched versions: `\u003e= 2026.3.31`\n- First stable tag containing the fix: `v2026.3.31`\n\n## Fix Commit(s)\n- `2ce44ca6a1302b166a128abbd78f72114f2f4f52` \u2014 2026-03-31T12:59:42+01:00\n\n## Release Process Note\n- The fix is already present in released version `2026.3.31`.\n- This draft looks ready for final maintainer disposition or publication, not additional code-fix work.\n\nThanks @AntAISecurityLab for reporting.",
"id": "GHSA-vjx8-8p7h-82gr",
"modified": "2026-04-24T21:04:32Z",
"published": "2026-04-07T18:10:45Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vjx8-8p7h-82gr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41297"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/2ce44ca6a1302b166a128abbd78f72114f2f4f52"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-marketplace-plugin-download-redirect"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenClaw: Marketplace Plugin Download Follows Redirects Without SSRF Protection"
}
WID-SEC-W-2026-0948
Vulnerability from csaf_certbund - Published: 2026-03-31 22:00 - Updated: 2026-04-28 22:00Summary
OpenClaw: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: OpenClaw ist ein persönlicher KI-Assistent zur Ausführung auf eigenen Geräten.
Angriff: Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um erweiterte Privilegien zu erlangen, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, Daten offenzulegen oder zu manipulieren oder andere, nicht näher spezifizierte Angriffe durchzuführen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.3.31
Open Source / OpenClaw
|
<2026.3.31 |
References
55 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenClaw ist ein pers\u00f6nlicher KI-Assistent zur Ausf\u00fchrung auf eigenen Ger\u00e4ten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um erweiterte Privilegien zu erlangen, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten offenzulegen oder zu manipulieren oder andere, nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0948 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0948.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0948 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0948"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-3q42-xmxv-9vfr vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3q42-xmxv-9vfr"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-3qpv-xf3v-mm45 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3qpv-xf3v-mm45"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-3xv9-89fm-7h4r vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3xv9-89fm-7h4r"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-42mx-vp8m-j7qh vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-42mx-vp8m-j7qh"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-4g5x-2jfc-xm98 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4g5x-2jfc-xm98"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-57gh-m6rq-54cf vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-57gh-m6rq-54cf"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-58q2-7r52-jq62 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-58q2-7r52-jq62"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-6336-qqw9-v6x6 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-6336-qqw9-v6x6"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-68v4-hmwv-f43h vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-68v4-hmwv-f43h"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-6p8r-6m93-557f vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-6p8r-6m93-557f"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-767m-xrhc-fxm7 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-767m-xrhc-fxm7"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-7ggg-pvrf-458v vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7ggg-pvrf-458v"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-877v-w3f5-3pcq vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-877v-w3f5-3pcq"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-89r3-6x4j-v7wf vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-89r3-6x4j-v7wf"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-9f4w-67g7-mqwv vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9f4w-67g7-mqwv"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-9gp8-hjxr-6f34 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9gp8-hjxr-6f34"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-9p3r-hh9g-5cmg vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-9q7v-8mr7-g23p vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9q7v-8mr7-g23p"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-cg7q-fg22-4g98 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cg7q-fg22-4g98"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-chfm-xgc4-47rj vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-chfm-xgc4-47rj"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-cqgw-44wg-44rf vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cqgw-44wg-44rf"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-cwf8-44x6-32c2 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cwf8-44x6-32c2"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-cwq8-6f96-g3q4 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cwq8-6f96-g3q4"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-f693-58pc-2gfr vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f693-58pc-2gfr"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-f6pf-4gjx-c94r vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f6pf-4gjx-c94r"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-fv94-qvg8-xqpw vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fv94-qvg8-xqpw"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-fwjq-xwfj-gv75 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fwjq-xwfj-gv75"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-g374-mggx-p6xc vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g374-mggx-p6xc"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-g5cg-8x5w-7jpm vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g5cg-8x5w-7jpm"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-g8xp-qx39-9jq9 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g8xp-qx39-9jq9"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-gg9v-mgcp-v6m7 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gg9v-mgcp-v6m7"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-gjm7-hw8f-73rq vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gjm7-hw8f-73rq"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-h2v7-xc88-xx8c vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h2v7-xc88-xx8c"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-h5hg-h7rr-gpf3 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h5hg-h7rr-gpf3"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-hhff-fj5f-qg48 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hhff-fj5f-qg48"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-hhq4-97c2-p447 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hhq4-97c2-p447"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-hr8g-2q7x-3f4w vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hr8g-2q7x-3f4w"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-j9pv-rrcj-6pfx vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-j9pv-rrcj-6pfx"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-jjw7-3vjf-fg5j vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jjw7-3vjf-fg5j"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-m6fx-m8hc-572m vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-m6fx-m8hc-572m"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-mhgq-xpfq-6r66 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mhgq-xpfq-6r66"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-mhr7-2xmv-4c4q vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mhr7-2xmv-4c4q"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-p464-m8x6-vhv8 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-p464-m8x6-vhv8"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-q9w8-cf67-r238 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-q9w8-cf67-r238"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-qcc3-jqwp-5vh2 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qcc3-jqwp-5vh2"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-qcj9-wwgw-6gm8 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qcj9-wwgw-6gm8"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-rfqg-qgf8-xr9x vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rfqg-qgf8-xr9x"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-rg8m-3943-vm6q vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rg8m-3943-vm6q"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-rm5c-4rmf-vvhw vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rm5c-4rmf-vvhw"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-v3qc-wrwx-j3pw vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v3qc-wrwx-j3pw"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-vjx8-8p7h-82gr vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vjx8-8p7h-82gr"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-w85g-3h6x-4xh2 vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w85g-3h6x-4xh2"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-x2m8-53h4-6hch vom 2026-03-31",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x2m8-53h4-6hch"
}
],
"source_lang": "en-US",
"title": "OpenClaw: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-28T22:00:00.000+00:00",
"generator": {
"date": "2026-04-29T04:49:15.427+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0948",
"initial_release_date": "2026-03-31T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-20T22:00:00.000+00:00",
"number": "2",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-04-23T22:00:00.000+00:00",
"number": "3",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2026-04-27T22:00:00.000+00:00",
"number": "4",
"summary": "Referenzen erg\u00e4nzt"
},
{
"date": "2026-04-28T22:00:00.000+00:00",
"number": "5",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2026.3.31",
"product": {
"name": "Open Source OpenClaw \u003c2026.3.31",
"product_id": "T052351"
}
},
{
"category": "product_version",
"name": "2026.3.31",
"product": {
"name": "Open Source OpenClaw 2026.3.31",
"product_id": "T052351-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openclaw:openclaw:2026.3.31"
}
}
}
],
"category": "product_name",
"name": "OpenClaw"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41296",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41296"
},
{
"cve": "CVE-2026-41297",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41297"
},
{
"cve": "CVE-2026-41300",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41300"
},
{
"cve": "CVE-2026-41302",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41302"
},
{
"cve": "CVE-2026-41329",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41329"
},
{
"cve": "CVE-2026-41330",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41330"
},
{
"cve": "CVE-2026-41331",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41331"
},
{
"cve": "CVE-2026-41333",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41333"
},
{
"cve": "CVE-2026-41334",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41334"
},
{
"cve": "CVE-2026-41335",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41335"
},
{
"cve": "CVE-2026-41336",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41336"
},
{
"cve": "CVE-2026-41337",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41337"
},
{
"cve": "CVE-2026-41338",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41338"
},
{
"cve": "CVE-2026-41340",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41340"
},
{
"cve": "CVE-2026-41341",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41341"
},
{
"cve": "CVE-2026-41343",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41343"
},
{
"cve": "CVE-2026-41345",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41345"
},
{
"cve": "CVE-2026-41347",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41347"
},
{
"cve": "CVE-2026-41349",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41349"
},
{
"cve": "CVE-2026-41350",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41350"
},
{
"cve": "CVE-2026-41353",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41353"
},
{
"cve": "CVE-2026-41355",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41355"
},
{
"cve": "CVE-2026-41356",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41356"
},
{
"cve": "CVE-2026-41357",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41357"
},
{
"cve": "CVE-2026-41359",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41359"
},
{
"cve": "CVE-2026-41364",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41364"
},
{
"cve": "CVE-2026-41365",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41365"
},
{
"cve": "CVE-2026-41366",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41366"
},
{
"cve": "CVE-2026-41369",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41369"
},
{
"cve": "CVE-2026-41370",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41370"
},
{
"cve": "CVE-2026-41373",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41373"
},
{
"cve": "CVE-2026-41374",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41374"
},
{
"cve": "CVE-2026-41375",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41375"
},
{
"cve": "CVE-2026-41376",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41376"
},
{
"cve": "CVE-2026-41377",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41377"
},
{
"cve": "CVE-2026-41378",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41378"
},
{
"cve": "CVE-2026-41379",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41379"
},
{
"cve": "CVE-2026-41381",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41381"
},
{
"cve": "CVE-2026-41382",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41382"
},
{
"cve": "CVE-2026-41385",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41385"
},
{
"cve": "CVE-2026-41386",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41386"
},
{
"cve": "CVE-2026-41391",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41391"
},
{
"cve": "CVE-2026-41393",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41393"
},
{
"cve": "CVE-2026-41394",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41394"
},
{
"cve": "CVE-2026-41396",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41396"
},
{
"cve": "CVE-2026-41397",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41397"
},
{
"cve": "CVE-2026-41402",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41402"
},
{
"cve": "CVE-2026-41403",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41403"
},
{
"cve": "CVE-2026-41404",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41404"
},
{
"cve": "CVE-2026-41405",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41405"
},
{
"cve": "CVE-2026-41406",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41406"
},
{
"cve": "CVE-2026-41408",
"product_status": {
"known_affected": [
"T052351"
]
},
"release_date": "2026-03-31T22:00:00.000+00:00",
"title": "CVE-2026-41408"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…