CVE-2026-41302
Published: 21 April 2026
Summary
CVE-2026-41302 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates user-supplied inputs to the marketplace plugin download functionality, preventing arbitrary URLs from triggering unguarded fetch() calls.
Monitors and controls communications at system boundaries to block SSRF-exploited requests from reaching internal resources or unauthorized external services.
Requires timely remediation of the SSRF flaw via patching to OpenClaw 2026.3.31, eliminating the vulnerable unguarded fetch() behavior.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in public-facing download feature directly enables T1190 exploitation of the application; unguarded fetch() allows arbitrary retrieval of external/internal content, facilitating T1105 ingress tool transfer.
NVD Description
OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows remote attackers to make arbitrary network requests. Attackers can exploit unguarded fetch() calls to access internal resources or interact with external services on…
more
behalf of the affected system.
Deeper analysisAI
CVE-2026-41302 is a server-side request forgery (SSRF) vulnerability, tracked under CWE-918, affecting OpenClaw versions prior to 2026.3.31. The flaw exists in the marketplace plugin's download functionality, where unguarded fetch() calls allow remote attackers to initiate arbitrary network requests from the server.
The vulnerability carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N). Attackers with low privileges (PR:L) can exploit it over the network with low complexity by tricking a user into interacting with the download feature (UI:R). Successful exploitation enables arbitrary requests that access internal resources or interact with external services on behalf of the affected OpenClaw system, resulting in high confidentiality impact across a changed scope.
Mitigation is addressed in OpenClaw 2026.3.31 via a patch commit (8deb9522f3d2680820588b190adb4a2a52f3670b). Relevant advisories include the GitHub security notice (GHSA-9q7v-8mr7-g23p) and VulnCheck's analysis, which recommend upgrading to the fixed version to prevent exploitation.
Details
- CWE(s)