CDP /json/version WebSocket URL could pivot to untrusted second-hop targets.
openclaw< 2026.4.5>= 2026.4.5A browser profile could trust a CDP /json/version response whose webSocketDebuggerUrl pointed at a different host, enabling a second-hop SSRF-style pivot.
The fix normalizes and re-validates direct CDP WebSocket targets before connecting.
The issue was fixed in #60469. The first stable tag containing the fix is v2026.4.5, and openclaw@2026.4.14 includes the fix.
bc356cc8c2beaa747c71dd86cceab8f804699665Users should upgrade to openclaw 2026.4.5 or newer. The latest npm release, 2026.4.14, already includes the fix.
Thanks to @tdjackey for reporting this issue.
2026.4.5Exploitability
AV:NAC:LAT:PPR:NUI:NVulnerable System
VC:LVI:NVA:NSubsequent System
SC:LSI:NSA:N6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N