Impact
OpenClaw versions prior to 2026.2.2 contain a server‑side request forgery vulnerability in the attachment and media URL hydration process. When a message is sent or auto‑replied, an attacker able to control media URLs can cause the server to fetch arbitrary HTTP(S) resources. The fetched response is returned as an outbound attachment, allowing the attacker to access internal services or exfiltrate sensitive data.
Affected Systems
The product affected is OpenClaw. Versions older than 2026.2.2 are vulnerable because they lack the check introduced in that release. No other vendors or product lines are listed in the advisory.
Risk and Exploitability
The CVSS score of 6.3 classifies the issue as medium severity. The EPSS score is below 1 %, indicating a very low predicted exploitation likelihood, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to influence media URLs via the model‑controlled sendAttachment or auto‑reply mechanisms, after which the server can reach internal endpoints and return their contents to the attacker.
OpenCVE Enrichment
Github GHSA