This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: OpenClaw < 2026.3.7 suffers from improper header validation in `fetchWithSsrFGuard`. <br>π₯ **Consequences**: Custom Authorization headers leak during cross-origin redirects. Sensitive info is intercepted!β¦
π‘οΈ **Root Cause**: CWE-522 (Insufficiently Protected Credentials). <br>π **Flaw**: The function fails to strip or validate headers properly when redirecting, allowing them to follow the request to unintended origins.
Q3Who is affected? (Versions/Components)
π₯ **Affected**: All OpenClaw versions prior to **2026.3.7**. <br>π¦ **Component**: The `fetchWithSsrFGuard` function within the OpenClaw intelligent assistant core.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Hackers Can**: Intercept sensitive Authorization tokens/headers. <br>π **Impact**: High Confidentiality loss (C:H), Low Integrity (I:L). They can impersonate users or access private data via cross-origin redirects.
π« **Public Exploit**: **No**. <br>π **PoCs**: The `pocs` array is empty in the data. <br>β οΈ **Status**: Theoretical risk based on the flaw, but no active wild exploitation confirmed yet.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for OpenClaw instances running version **< 2026.3.7**. <br>π§ͺ **Test**: Monitor network traffic for `fetchWithSsrFGuard` calls that redirect to third-party domains while retaining custom headers.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed**: **Yes**. <br>π§ **Patch**: Official patch available via GitHub commit `46715371b0612a6f9114dffd1466941ac476cef5`. <br>π **Advisory**: See GHSA-6mgf-v5j7-45cr.
Q9What if no patch? (Workaround)
π **No Patch Workaround**: If you cannot upgrade immediately, disable cross-origin requests or strictly whitelist redirect targets.β¦