Description
OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the configured Urbit URL can induce the gateway to make HTTP requests to arbitrary hosts including internal addresses.
Published: 2026-03-05
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery allowing access to internal resources
Action: Patch
AI Analysis

Impact

OpenClaw versions before 2026.2.14 contain a server‑side request forgery flaw in the optional Tlon Urbit extension. The gateway accepts a user‑controlled base URL for authentication without validating that it points to a legitimate destination. An attacker who can influence the configured Urbit URL can cause the server to issue HTTP requests to arbitrary hosts, including internal network addresses, exposing internal data and potentially enabling further exploitation. The weakness is a classic input‑validation failure (CWE‑918), allowing remote HTTP calls that bypass normal access controls.

Affected Systems

Any installation of OpenClaw that has the Tlon Urbit extension enabled and is running a version prior to 2026.2.14 is impacted. The vulnerability applies to all deployments where the base Urbit URL can be influenced by an external user or attacker. No specific third‑party integrations are mentioned beyond the Tlon component.

Risk and Exploitability

The CVSS base score of 6.3 indicates a medium severity risk. The EPSS score of less than 1% shows a very low current probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, the attack vector is inferred to require the attacker to modify the configured Urbit URL or otherwise influence the authentication process, which could be feasible in environments where configuration is exposed or improperly secured. Once exploited, the attacker can retrieve or manipulate data located on internal hosts that the gateway is permitted to contact.

Generated by OpenCVE AI on April 16, 2026 at 11:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch to upgrade OpenClaw to version 2026.2.14 or newer.
  • Disable or remove the optional Tlon Urbit extension until a secure version is available.
  • If disabling is not possible, limit the set of acceptable outbound targets by validating the base URL or enforcing an allow‑list of trusted hosts.
  • Supplement the soft‑ware fix with perimeter firewall rules that block unauthorized outbound HTTP connections originating from the OpenClaw service.

Generated by OpenCVE AI on April 16, 2026 at 11:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pg2v-8xwh-qhcc OpenClaw affected by SSRF in optional Tlon (Urbit) extension authentication
History

Mon, 09 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the configured Urbit URL can induce the gateway to make HTTP requests to arbitrary hosts including internal addresses.
Title OpenClaw < 2026.2.14 - Server-Side Request Forgery in Tlon Extension Authentication
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-918
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T18:10:20.787Z

Reserved: 2026-02-27T19:20:03.060Z

Link: CVE-2026-28476

cve-icon Vulnrichment

Updated: 2026-03-09T18:10:15.868Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:21.807

Modified: 2026-04-21T14:52:03.430

Link: CVE-2026-28476

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses