OpenClaw's `fetchWithSsrFGuard` function fails to strip sensitive HTTP headers and request bodies before following cross-origin redirects, meaning an AI agent workflow can inadvertently forward authorization tokens, session credentials, or POST payloads to unintended third-party origins. While the advisory scopes this to OpenClaw's local, user-controlled trust model (no multi-tenant blast radius), AI agents routinely carry bearer tokens and API keys in outbound requests — making credential exfiltration the realistic worst case if a redirect chain passes through an attacker-controlled host. With 60 CVEs already on record in this package and a documented malicious skills ecosystem (AIID #1368, where ~17% of third-party skills were flagged as malicious), the risk of a skill chaining this into a credential-theft attack is non-trivial. Upgrade to openclaw 2026.4.8 (commit d7c3210) immediately; there is no viable workaround short of patching.
Risk Assessment
Medium-High. The vulnerability is scoped to local deployments and carries no EPSS score or KEV listing, suggesting low opportunistic exploitation activity today. However, the broader OpenClaw ecosystem context elevates risk significantly: the package has 60 known CVEs and a documented history of malicious third-party skills. An adversary who controls a redirect target (via a malicious skill, a poisoned URL in a task, or a prompt injection) can passively harvest credentials with no user interaction beyond normal agent operation. The absence of CVSS vector data prevents precise scoring, but the CWE-345 weakness class combined with AI agent autonomy shifts this toward high operational risk for any team using OpenClaw with credentialed API access.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | < 2026.4.8 | 2026.4.8 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Patch immediately: upgrade openclaw to version 2026.4.8 (verified fixed tree: commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5).
- Audit installed skills: review all third-party OpenClaw skills for suspicious redirect patterns or external URL calls, given the documented malicious skills ecosystem.
- Rotate credentials: if openclaw agents have been making authenticated HTTP requests prior to patching, treat associated API keys, bearer tokens, and session credentials as potentially compromised.
- Network-layer detection: inspect outbound HTTP traffic from OpenClaw processes for unexpected cross-origin POST requests or credential-bearing redirects.
- Least-privilege: restrict the API scopes and credentials available to OpenClaw agents to the minimum required for their tasks.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Frequently Asked Questions
What is GHSA-qx8j-g322-qj6m?
OpenClaw's `fetchWithSsrFGuard` function fails to strip sensitive HTTP headers and request bodies before following cross-origin redirects, meaning an AI agent workflow can inadvertently forward authorization tokens, session credentials, or POST payloads to unintended third-party origins. While the advisory scopes this to OpenClaw's local, user-controlled trust model (no multi-tenant blast radius), AI agents routinely carry bearer tokens and API keys in outbound requests — making credential exfiltration the realistic worst case if a redirect chain passes through an attacker-controlled host. With 60 CVEs already on record in this package and a documented malicious skills ecosystem (AIID #1368, where ~17% of third-party skills were flagged as malicious), the risk of a skill chaining this into a credential-theft attack is non-trivial. Upgrade to openclaw 2026.4.8 (commit d7c3210) immediately; there is no viable workaround short of patching.
Is GHSA-qx8j-g322-qj6m actively exploited?
No confirmed active exploitation of GHSA-qx8j-g322-qj6m has been reported, but organizations should still patch proactively.
How to fix GHSA-qx8j-g322-qj6m?
1. Patch immediately: upgrade openclaw to version 2026.4.8 (verified fixed tree: commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5). 2. Audit installed skills: review all third-party OpenClaw skills for suspicious redirect patterns or external URL calls, given the documented malicious skills ecosystem. 3. Rotate credentials: if openclaw agents have been making authenticated HTTP requests prior to patching, treat associated API keys, bearer tokens, and session credentials as potentially compromised. 4. Network-layer detection: inspect outbound HTTP traffic from OpenClaw processes for unexpected cross-origin POST requests or credential-bearing redirects. 5. Least-privilege: restrict the API scopes and credentials available to OpenClaw agents to the minimum required for their tasks.
What systems are affected by GHSA-qx8j-g322-qj6m?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, AI assistants, AI agent tool integrations.
What is the CVSS score for GHSA-qx8j-g322-qj6m?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Impact `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects. A guarded fetch could resend unsafe request bodies or headers when following cross-origin redirects. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<2026.3.31` - Patched versions: `2026.4.8` ## Fix The issue was fixed on `main` and is available in the patched npm version listed above. The verified fixed tree is commit `d7c3210cd6f5fdfdc1beff4c9541673e814354d5`. ## Verification The fix was re-checked against `main` before publication, including targeted regression tests for the affected security boundary. ## Credits Thanks @BG0ECV for reporting.
Exploitation Scenario
An attacker publishes a seemingly useful OpenClaw skill to ClawHub (the third-party skill marketplace). The skill instructs the agent to call a legitimate-looking API endpoint — for example, a productivity tool integration. The attacker's server responds with a 302 redirect to an attacker-controlled domain. Due to the `fetchWithSsrFGuard` vulnerability, OpenClaw replays the original request including its Authorization header and POST body to the attacker's server. The attacker silently harvests the credential and uses it to access the victim's connected services (cloud APIs, SaaS platforms, internal tooling). The victim sees normal agent operation with no visible anomaly, and the skill deletes itself after execution. This scenario directly parallels the documented AIID #1368 attack pattern using OpenClaw's skills ecosystem.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert