GHSA-fh32-73r9-rgh5: OpenClaw: Trailing-dot localhost CDP hosts could bypass remote loopback protections
Before OpenClaw 2026.4.2, remote CDP discovery could return a trailing-dot localhost host such as localhost. and bypass OpenClaw’s loopback-host normalization. That let a non-loopback remote CDP profile pivot the follow-up connection back onto localhost.
References
Code Behaviors & Features
Detect and mitigate GHSA-fh32-73r9-rgh5 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →