Impact
OpenClaw versions prior to 2026.2.22 contain an incomplete validation of IPv4 special‑use ranges in the isPrivateIpv4() function, which allows requests that target RFC‑reserved addresses such as 198.18.0.0/15 to bypass the SSRF guard. This Server‑Side Request Forgery flaw enables an attacker with network reachability to these non‑global IP ranges to use the web_fetch functionality to access internal resources or services that should be blocked, potentially exposing confidential information or facilitating further exploitation.
Affected Systems
All OpenClaw instances running any release older than 2026.2.22 are affected. The vendor lists the product as OpenClaw:OpenClaw; no further sub‑versions are specified, so any version before the stated point should be considered vulnerable until the fix is applied.
Risk and Exploitability
The CVSS score of 2.3 indicates low overall severity, and no EPSS score is available. The vulnerability is not listed in CISA's KEV catalog. Exploitation requires the attacker to have network reachability to the special‑use IP ranges from a server that can communicate with the OpenClaw instance. While the risk is lower than high‑impact flaws, the ability to reach internal services could be valuable to threat actors.
OpenCVE Enrichment
Github GHSA