Impact
In OpenClaw versions 2026.2.17 and older, the cron webhook delivery code calls fetch() directly without performing SSRF policy checks. This allows a webhook target to be directed at private, metadata, or internal endpoints that should be inaccessible from the application, potentially exposing internal services or sensitive data. The weakness is an SSRF flaw, classified as CWE‑918.
Affected Systems
The affected product is OpenClaw, provided by OpenClaw. Versions 2026.2.17 and earlier are vulnerable. The issue was fixed in release 2026.2.19. No other product variants are listed.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. The EPSS score is below 1 %, suggesting a low but non‑zero likelihood of exploitation, and the vulnerability is not currently listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation would require an attacker to influence the webhook configuration or trigger the cron job, allowing the application to issue unintended requests to internal resources. The lack of SSRF controls is the primary attack vector, and no additional preconditions are noted in the available information.
OpenCVE Enrichment
Github GHSA