<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-43573 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-43573/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:16:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-43573/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw SSRF Policy Bypass Vulnerability (CVE-2026-43573)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</link><pubDate>Tue, 05 May 2026 12:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</guid><description>OpenClaw before version 2026.4.10 is vulnerable to a server-side request forgery (SSRF) policy bypass, allowing attackers to bypass navigation guards and interact with unauthorized targets.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.4.10 are susceptible to a server-side request forgery (SSRF) policy bypass vulnerability, identified as CVE-2026-43573. This flaw exists in the existing-session browser interaction routes, enabling attackers to circumvent SSRF navigation guards. Successful exploitation allows an attacker to interact with or navigate to unauthorized targets without the intended policy enforcement. This vulnerability could lead to the exposure of sensitive information, unauthorized access to internal resources, or further exploitation of other system components. Defenders need to ensure OpenClaw instances are updated to the latest version to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an OpenClaw instance running a version prior to 2026.4.10.</li>
<li>The attacker crafts a malicious request targeting an existing user session within the OpenClaw application.</li>
<li>The crafted request is designed to exploit the SSRF policy bypass in the browser interaction routes.</li>
<li>The vulnerable code fails to properly enforce SSRF navigation guards during browser interaction.</li>
<li>The attacker is able to bypass the intended SSRF protections and initiate requests to unauthorized internal or external targets.</li>
<li>The OpenClaw server processes the attacker-initiated request without proper validation.</li>
<li>The attacker interacts with or navigates to unauthorized targets, potentially gaining access to sensitive information or internal resources.</li>
<li>The attacker may leverage the compromised session to further escalate privileges or perform other malicious activities within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-43573 allows attackers to bypass SSRF protections in OpenClaw, potentially leading to unauthorized access to sensitive data or internal resources. The impact depends on the specific configurations and network architecture of the affected OpenClaw deployment, but could include exposure of confidential information, disruption of services, or further compromise of internal systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.10 or later to patch the SSRF policy bypass vulnerability (CVE-2026-43573).</li>
<li>Deploy the Sigma rule &ldquo;OpenClaw SSRF Attempt&rdquo; to detect exploitation attempts targeting the vulnerable browser interaction routes.</li>
<li>Review and harden existing session management policies in OpenClaw to prevent unauthorized session access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-43573</category><category>vulnerability</category></item></channel></rss>