GHSA-qx8j-g322-qj6m

Suggest an improvement
Source
https://github.com/advisories/GHSA-qx8j-g322-qj6m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-qx8j-g322-qj6m/GHSA-qx8j-g322-qj6m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qx8j-g322-qj6m
Aliases
  • CVE-2026-40037
Downstream
Published
2026-04-09T17:37:08Z
Modified
2026-04-10T20:35:03.690237Z
Severity
  • 7.4 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects
Details

Impact

fetchWithSsrFGuard replays unsafe request bodies across cross-origin redirects.

A guarded fetch could resend unsafe request bodies or headers when following cross-origin redirects.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.

Affected Packages / Versions

  • Package: openclaw (npm)
  • Affected versions: <2026.3.31
  • Patched versions: 2026.4.8

Fix

The issue was fixed on main and is available in the patched npm version listed above. The verified fixed tree is commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5.

Verification

The fix was re-checked against main before publication, including targeted regression tests for the affected security boundary.

Credits

Thanks @BG0ECV for reporting.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-04-09T17:37:08Z",
    "cwe_ids": [
        "CWE-345"
    ],
    "severity": "HIGH",
    "nvd_published_at": null
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.4.8

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-qx8j-g322-qj6m/GHSA-qx8j-g322-qj6m.json"