Impact
OpenClaw versions prior to 2026.3.1 contain a server‑side request forgery (SSRF) vulnerability in the web_search citation redirect resolution component. The flaw allows an attacker who can influence citation redirect targets to direct the OpenClaw host to send internal‑network requests to loopback, private, or other internal destinations, potentially exposing internal services or data. The weakness is classified as CWE‑918 and provides an attacker with the ability to access internal resources that are normally protected from external access.
Affected Systems
The vulnerability affects the OpenClaw product from OpenClaw, as identified by the CPE string cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*. All releases older than 2026.3.1 are impacted; version information beyond the upper bound 2026.3.1 is not provided in the CVE data.
Risk and Exploitability
The CVSS score for this issue is 5.3, indicating moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, through crafted inputs that influence the citation redirect mechanism, such as a web search request or API call. Exploitation would require the ability to supply a malicious redirect URI; once achieved, the attacker can cause the OpenClaw server to perform HTTP requests to internal addresses, potentially leading to data exposure or further internal compromise.
OpenCVE Enrichment
Github GHSA