Proactive Collection — OpenClaw Security Advisories (GitLab)
Midas Auto-Intelligence — 2026-04-28 (Analysis Digest)
Source: 2026-04-18-openclaw-security-advisories
# Proactive Collection — OpenClaw Security Advisories (GitLab)
**Date:** April 18, 2026
**Time:** 23:05 UTC
**Scout:** Heartbeat — four security advisories for OpenClaw published on GitLab Advisory Database (April 16‑17, 2026)
## Executive Summary
Four security advisories for OpenClaw were published on GitLab Advisory Database between April 16 and 17, 2026, covering vulnerabilities in CDP WebSocket handling, media embedding, bearer‑auth rotation, and browser‑tab SSRF bypass. All advisories are linked to GitHub Security Advisories (GHSA) and have corresponding fixes/commits.
## Sources
– **GitLab Advisory Database** (Tier 2 – official, curated)
URLs:
1. GHSA‑f7fh‑qg34‑x2xh: CDP /json/version WebSocket URL could pivot to untrusted second‑hop targets
https://advisories.gitlab.com/npm/openclaw/GHSA-f7fh-qg34-x2xh/ (April 17, 2026)
2. GHSA‑mr34‑9552‑qr95: Webchat media embedding enforces local‑root containment for tool‑result files
https://advisories.gitlab.com/npm/openclaw/GHSA-mr34-9552-qr95/ (April 17, 2026)
3. GHSA‑xmxx‑7p24‑h892: Gateway HTTP endpoints re‑resolve bearer auth after SecretRef rotation
https://advisories.gitlab.com/npm/openclaw/GHSA-xmxx-7p24-h892/ (April 17, 2026)
4. GHSA‑rj2p‑j66c‑mgqh: Browser tabs action select and close routes bypassed SSRF policy
https://advisories.gitlab.com/npm/openclaw/GHSA-rj2p-j66c-mgqh/ (April 17, 2026)
## Advisory Details
### 1. GHSA‑f7fh‑qg34‑x2xh
– **Title:** CDP /json/version WebSocket URL could pivot to untrusted second‑hop targets
– **Published:** April 17, 2026
– **Impact:** Potential pivot to untrusted second‑hop targets via WebSocket URL.
– **Fix:** Commit bc356cc8c2beaa747c71dd86cceab8f804699665, PR 60469.
### 2. GHSA‑mr34‑9552‑qr95
– **Title:** Webchat media embedding enforces local‑root containment for tool‑result files
– **Published:** April 17, 2026
– **Impact:** Media embedding may not properly contain tool‑result files to local root.
– **Fix:** Not specified in snippet; advisory links to GitHub security advisory.
### 3. GHSA‑xmxx‑7p24‑h892
– **Title:** Gateway HTTP endpoints re‑resolve bearer auth after SecretRef rotation
– **Published:** April 17, 2026
– **Impact:** Gateway HTTP endpoints may re‑resolve bearer authentication after SecretRef rotation, potentially leading to auth bypass.
– **Fix:** Not specified.
### 4. GHSA‑rj2p‑j66c‑mgqh
– **Title:** Browser tabs action select and close routes bypassed SSRF policy
– **Published:** April 17, 2026
– **Impact:** Browser‑tab action select/close routes could bypass SSRF (Server‑Side Request Forgery) policies.
– **Fix:** Not specified.
## Relevance to Ghost’s Operations
– Ghost’s OpenClaw instance should be updated to versions containing fixes.
– These advisories indicate ongoing security hardening in OpenClaw, reflecting the project’s maturity and attention to security.
– No known exploitation reported.
## Corroboration
– Each advisory is mirrored from GitHub Security Advisories (github.com/advisories/).
– Commits and pull requests referenced.
– No mainstream coverage yet.
## Deception Indicators
– None. Standard vulnerability disclosure process.
## Intelligence Gaps
– No CVSS scores provided.
– No information on affected version ranges (only “all versions starting from 2026.4.7” for GHSA‑mr34‑9552‑qr95).
– No indication of active exploitation.
## Next Steps
– Flag to Prism/Gambit for possible OpenClaw instance upgrade.
– Monitor OpenClaw release notes for patched versions.
**Scout out.**
