Cyber Posture

CVE-2026-41302

HighPublic PoC

Published: 21 April 2026

Published
21 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
EPSS Score 0.0004 11.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41302 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates user-supplied inputs to the marketplace plugin download functionality, preventing arbitrary URLs from triggering unguarded fetch() calls.

prevent

Monitors and controls communications at system boundaries to block SSRF-exploited requests from reaching internal resources or unauthorized external services.

prevent

Requires timely remediation of the SSRF flaw via patching to OpenClaw 2026.3.31, eliminating the vulnerable unguarded fetch() behavior.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

SSRF in public-facing download feature directly enables T1190 exploitation of the application; unguarded fetch() allows arbitrary retrieval of external/internal content, facilitating T1105 ingress tool transfer.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows remote attackers to make arbitrary network requests. Attackers can exploit unguarded fetch() calls to access internal resources or interact with external services on…

more

behalf of the affected system.

Deeper analysisAI

CVE-2026-41302 is a server-side request forgery (SSRF) vulnerability, tracked under CWE-918, affecting OpenClaw versions prior to 2026.3.31. The flaw exists in the marketplace plugin's download functionality, where unguarded fetch() calls allow remote attackers to initiate arbitrary network requests from the server.

The vulnerability carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N). Attackers with low privileges (PR:L) can exploit it over the network with low complexity by tricking a user into interacting with the download feature (UI:R). Successful exploitation enables arbitrary requests that access internal resources or interact with external services on behalf of the affected OpenClaw system, resulting in high confidentiality impact across a changed scope.

Mitigation is addressed in OpenClaw 2026.3.31 via a patch commit (8deb9522f3d2680820588b190adb4a2a52f3670b). Relevant advisories include the GitHub security notice (GHSA-9q7v-8mr7-g23p) and VulnCheck's analysis, which recommend upgrading to the fixed version to prevent exploitation.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.3.31

CVEs Like This One

CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw
CVE-2026-22181Same product: Openclaw Openclaw
CVE-2026-28476Same product: Openclaw Openclaw
CVE-2026-6011Same product: Openclaw Openclaw
CVE-2026-41914Same product: Openclaw Openclaw
CVE-2026-43526Same product: Openclaw Openclaw
CVE-2026-34504Same product: Openclaw Openclaw
CVE-2026-28467Same product: Openclaw Openclaw

References