Impact
OpenClaw’s SSRF protection could be bypassed by using full‑form IPv4‑mapped IPv6 literals, such as 0:0:0:0:0:ffff:7f00:1, which resolves to 127.0.0.1. This allows requests that should be blocked—loopback, private network, or link‑local metadata—to pass the guard. As a result, an attacker could coerce the application to access internal services, exposing sensitive data or enabling further exploitation. The weakness corresponds to CWE‑918 and the vulnerability is scored CVSS 7.5.
Affected Systems
The affected product is OpenClaw releases prior to version 2026.2.14. The issue was fixed in release v2026.2.14, available from the OpenClaw GitHub repository.
Risk and Exploitability
The CVSS score of 7.5 indicates high risk, but the EPSS score of <1% suggests that exploit attempts are currently rare. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to supply the crafted IPv4‑mapped IPv6 address in a request that reaches the SSRF target endpoint; if they can influence such a request, they can exploit the bypass. The most likely attack vector is an externally triggered request to the OpenClaw instance, potentially via an exposed API or user interface that accepts URLs.
OpenCVE Enrichment
Github GHSA