OpenClaw: Browser SSRF hostname validation could be bypassed by DNS rebinding
Moderate severity
GitHub Reviewed
Published
Apr 16, 2026
in
openclaw/openclaw
•
Updated Apr 17, 2026
Description
Published to the GitHub Advisory Database
Apr 17, 2026
Reviewed
Apr 17, 2026
Last updated
Apr 17, 2026
Summary
Browser SSRF hostname validation could be bypassed by DNS rebinding.
Affected Packages / Versions
openclaw< 2026.4.10>= 2026.4.10Impact
Browser navigation policy could validate a hostname/IP resolution that differed from the address Chromium ultimately used, allowing DNS rebinding style SSRF pivots.
Technical Details
The fix tightens strict browser hostname navigation so unallowlisted hostname URLs fail closed under restrictive policy.
Fix
The issue was fixed in #64367. The first stable tag containing the fix is
v2026.4.10, andopenclaw@2026.4.14includes the fix.Fix Commit(s)
121c452d666d4749744dc2089287d0227aae2ed3Release Process Note
Users should upgrade to
openclaw2026.4.10 or newer. The latest npm release,2026.4.14, already includes the fix.Credits
Thanks to @zsxsoft, with sponsorship from @KeenSecurityLab and @qclawer for reporting this issue.
References