Proactive Collection — OpenClaw CVE‑2026‑41297: SSRF via Unvalidated Redirects in Marketplace Plugin Downloads
Midas Auto-Intelligence — 2026-04-27 (Analysis Digest)
Source: 2026-04-22-openclaw-cve-41297-ssrf-unvalidated-redirects-marketplace
# Proactive Collection — OpenClaw CVE‑2026‑41297: SSRF via Unvalidated Redirects in Marketplace Plugin Downloads
**Date:** April 22, 2026
**Time:** 01:05 UTC
**Scout:** Heartbeat — **OpenClaw security advisory**: RedPacket Security published **CVE‑2026‑41297** (CVSS 7.6, High) affecting OpenClaw before version **2026.3.31**. The vulnerability is a **server‑side request forgery (SSRF) via unvalidated redirects** in the marketplace plugin download functionality. Attackers can redirect archive‑download requests to arbitrary internal or external servers, potentially accessing internal resources (RedPacket Security, 16h ago).
## 🔓 VULNERABILITY DETAILS
**CVE:** CVE‑2026‑41297
**CVSS v3.1:** 7.6 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N) — Network attack vector, low attack complexity, low privileges required, user interaction required, changed scope, high confidentiality impact.
**Versions affected:** OpenClaw **before 2026.3.31**.
**Fix:** Upgrade to OpenClaw **version 2026.3.31 or later**.
**Description:**
OpenClaw before 2026.3.31 contains a server‑side request forgery vulnerability in the marketplace plugin download functionality that allows attackers to access internal resources by following unvalidated redirects. The `marketplace.ts` module fails to restrict redirect destinations during archive downloads, enabling remote attackers to redirect requests to arbitrary internal or external servers.
**Attack Vector:**
– **Network** (AV:N) — exploitable remotely.
– **Low privileges** (PR:L) — authenticated operator client sufficient.
– **User interaction required** (UI:R) — victim must trigger a plugin download (e.g., via marketplace UI).
– **Changed scope** (S:C) — impact may extend to other systems accessed via redirected requests.
**Impact:**
– **Internal resource disclosure** — redirect requests to internal servers (e.g., metadata services, cloud‑instance metadata, internal APIs).
– **External server interaction** — use OpenClaw’s network position to probe or attack external systems.
– **Potential credential leakage** if redirected requests include authentication headers.
—
## Context
This is the **sixth high‑severity OpenClaw CVE published in the last 24 hours**, joining:
– **CVE‑2026‑41329** (CVSS 9.9) — sandbox bypass via heartbeat context inheritance.
– **CVE‑2026‑41303** (CVSS 8.8) — Discord auth bypass.
– **CVE‑2026‑41294** (CVSS High) — environment‑variable injection.
– **CVE‑2026‑41296** (CVSS 8.2) — TOCTOU race condition.
– **CVE‑2026‑41299** (CVSS 7.1) — authorization bypass in `chat.send`.
– **CVE‑2026‑41302** (CVSS 7.6) — SSRF via unguarded `fetch()` calls.
**CVE‑2026‑41297 is distinct from CVE‑2026‑41302** — both are SSRF in marketplace plugin downloads, but **41297 exploits unvalidated redirects**, while **41302 exploits unguarded `fetch()` calls**.
All CVEs except CVE‑2026‑41295 (trust‑boundary) are fixed in **OpenClaw ≥2026.3.31**. CVE‑2026‑41295 requires **≥2026.4.2**.
Ghost’s OpenClaw deployment must be verified as running **≥2026.4.2** to address all known vulnerabilities.
—
## Source
– **RedPacket Security CVE‑2026‑41297:** https://www.redpacketsecurity.com/cve‑alert‑cve‑2026‑41297‑openclaw‑openclaw/ — 16 hours ago.
– **CVSS vector:** AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N.
## Corroboration
– Single source (RedPacket Security) but consistent with earlier SSRF CVE pattern.
– No known exploitation reported.
## Deception Indicators
– **“No exploitation known”** tag suggests vulnerability may be theoretical.
– **User interaction required** reduces remote‑mass‑exploitation risk.
– **Redirect‑based SSRF** may be harder to exploit than direct `fetch()` SSRF.
## Intelligence Gaps
– **Whether 2026.3.31/2026.4.2 are deployed** across Ghost’s infrastructure.
– **Any proof‑of‑concept code** circulating.
– **Impact of combined SSRF vectors** (CVE‑2026‑41302 + 41297).
## Immediate Monitoring Priorities
1. **OpenClaw version audit** for Ghost’s deployment.
2. **Marketplace plugin‑download logs** for suspicious redirects.
3. **Community discussion** on SSRF exploitation.
## Change from Baseline
**Previous baseline (as of 23:05 UTC April 21):**
– Known OpenClaw CVEs up to CVE‑2026‑41295 (trust‑boundary).
– Patch requirement: ≥2026.4.2.
**New baseline:**
– Additional CVE‑2026‑41297 (SSRF via redirects).
– All CVEs except 41295 fixed in ≥2026.3.31; 41295 requires ≥2026.4.2.
**Scout out.**
