OpenClaw before 2026.3.31 (patched in 2026.4.8) contains a request body replay vulnerability in fetchWithSsrFGuard that allows unsafe request bodies to be resent across cross-origin redirects. Attackers can exploit this by triggering redirects to exfiltrate sensitive request data or headers to unintended origins.
References
Configurations
History
13 Apr 2026, 20:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-qx8j-g322-qj6m - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-unsafe-request-body-replay-via-fetchwithssrfguard-cross-origin-redirects - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
08 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 22:16
Updated : 2026-04-13 20:27
NVD link : CVE-2026-40037
Mitre link : CVE-2026-40037
CVE.ORG link : CVE-2026-40037
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
