Description
OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass vulnerability in strict URL fetch paths that allows attackers to circumvent SSRF guards when environment proxy variables are configured. When HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables are present, attacker-influenced URLs can be routed through proxy behavior instead of pinned-destination routing, enabling access to internal targets reachable from the proxy environment.
Published: 2026-03-18
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Internal network access via SSRF bypass
Action: Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass in strict URL fetch paths. The vulnerability allows attackers to override DNS pinning when the HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables are present, enabling requests to be routed through a configured proxy instead of the pinned destination. This facilitates a Server‑Side Request Forgery (SSRF) bypass that can reach internal targets reachable through the proxy. The weakness is classified as CWE‑918 (Server Side Request Forgery).

Affected Systems

The affected product is OpenClaw:OpenClaw with all releases before 2026.3.2. No more granular version data is provided in the CNA affected version list.

Risk and Exploitability

The CVSS score of 6.1 indicates a medium severity vulnerability. The EPSS score is not available, and issue is not listed in the CISA KEV catalog. Based on the description it is inferred that the attack requires the attacker to influence the environment variables used by the application, typically via an SSRF scenario that injects or exploits proxy configuration. Once executed, the attacker can connect to arbitrary internal hosts that are reachable through the proxy, potentially allowing reconnaissance, data exfiltration, or further lateral movement. The exploit is likely to be network based and requires the attacker to be able to influence or hijack the environment in which OpenClaw runs.

Generated by OpenCVE AI on March 18, 2026 at 03:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.2 or later
  • Ensure that HTTP_PROXY, HTTPS_PROXY, and ALL_PROXY environment variables are unset or sanitized for the OpenClaw process
  • If proxy usage is required, restrict the proxy to only trusted destinations and verify that DNS pinning is enforced after applying the patch

Generated by OpenCVE AI on March 18, 2026 at 03:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8mvx-p2r9-r375 OpenClaw's web tools strict URL guard could lose DNS pinning when env proxy is configured
History

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L'}

cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}


Wed, 18 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass vulnerability in strict URL fetch paths that allows attackers to circumvent SSRF guards when environment proxy variables are configured. When HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables are present, attacker-influenced URLs can be routed through proxy behavior instead of pinned-destination routing, enabling access to internal targets reachable from the proxy environment.
Title OpenClaw < 2026.3.2 - DNS Pinning Bypass via Environment Proxy Configuration in web_fetch
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-918
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L'}

cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-25T14:33:11.716Z

Reserved: 2026-01-06T16:47:17.181Z

Link: CVE-2026-22181

cve-icon Vulnrichment

Updated: 2026-03-18T16:03:46.324Z

cve-icon NVD

Status : Modified

Published: 2026-03-18T02:16:22.800

Modified: 2026-03-25T15:16:36.967

Link: CVE-2026-22181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:53:37Z

Weaknesses