OpenClaw before 2026.4.2 contains an improper access control vulnerability in the iOS A2UI bridge that treats generic local-network pages as trusted origins. Attackers can inject unauthorized agent.request runs by loading attacker-controlled pages from local-network or tailnet hosts, polluting session state and consuming budget.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4p4f-fc8q-84m3 | OpenClaw: iOS A2UI bridge trusted generic local-network pages for agent.request dispatch |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.2 contains an improper access control vulnerability in the iOS A2UI bridge that treats generic local-network pages as trusted origins. Attackers can inject unauthorized agent.request runs by loading attacker-controlled pages from local-network or tailnet hosts, polluting session state and consuming budget. | |
| Title | OpenClaw - Unauthorized Agent Request Dispatch via Untrusted Local-Network Pages in iOS A2UI Bridge | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-346 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T12:17:40.590Z
Reserved: 2026-04-20T14:13:45.349Z
Link: CVE-2026-41398
No data.
Status : Analyzed
Published: 2026-04-28T19:37:43.287
Modified: 2026-04-30T16:56:42.403
Link: CVE-2026-41398
No data.
OpenCVE Enrichment
Updated: 2026-04-29T01:30:06Z
Weaknesses
Github GHSA