Description
OpenClaw versions prior to 2026.2.22 fail to consistently validate redirect chains against configured mediaAllowHosts allowlists during MSTeams media downloads. Attackers can supply or influence attachment URLs to force redirects to non-allowlisted targets, bypassing SSRF boundary controls.
Published: 2026-03-19
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: SSRF Bypass via Redirect Chain
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.2.22 fail to consistently validate redirect chains against the configured mediaAllowHosts allowlist when handling Microsoft Teams attachments. This flaw allows an attacker who can influence attachment URLs to force a chain of redirects that ultimately reaches a host not included in the allowlist, effectively bypassing the software’s SSRF (Server‑Side Request Forgery) boundary controls. The vulnerability is identified as CWE‑918, which denotes unsafe or incorrect handling of redirects. The consequence is that an attacker may be able to generate requests from the OpenClaw environment to internal or otherwise protected resources, exposing sensitive data or enabling further exploitation.

Affected Systems

This issue affects all OpenClaw:OpenClaw products running any Node.js‑based OpenClaw version prior to 2026.2.22. No more granular version ranges are listed; therefore any deployment of OpenClaw that has not been upgraded beyond the 2026.2.22 release is impacted.

Risk and Exploitability

The CVSS score is 2.3, indicating a low base severity. EPSS information is not available and the vulnerability is not listed in CISA’s KEV catalog, suggesting that widespread exploitation has not been observed yet. However, the flaw’s exploitation requires control over the attachment URL (for example, within a Microsoft Teams environment), which may be feasible for insiders or compromised users. The primary attack vector is through the Microsoft Teams attachment handling pathway, specifically during media download operations. Given the lack of publicly disclosed exploits, the immediate risk is considered low, but the potential for internal SSRF remains a concern for environments that rely on strict allowlist enforcement.

Generated by OpenCVE AI on March 19, 2026 at 23:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.2.22 or later to address the redirect chain validation flaw
  • If an immediate update is not possible, configure the network or application firewall to block or log HTTP redirects that target non‑allowlisted hosts during Microsoft Teams media downloads
  • Maintain monitoring of attachment URLs and redirect chains for anomalous patterns and apply temporary allowlist restrictions until the patch is applied

Generated by OpenCVE AI on March 19, 2026 at 23:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w76h-8m22-hpgh OpenClaw's MSTeams attachment redirect handling could bypass configured media host allowlists
History

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.22 fail to consistently validate redirect chains against configured mediaAllowHosts allowlists during MSTeams media downloads. Attackers can supply or influence attachment URLs to force redirects to non-allowlisted targets, bypassing SSRF boundary controls.
Title OpenClaw < 2026.2.22 - Redirect Chain Bypass of Media Host Allowlist in MSTeams Attachment Handling
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-918
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-20T18:09:42.171Z

Reserved: 2026-03-10T19:48:43.187Z

Link: CVE-2026-32037

cve-icon Vulnrichment

Updated: 2026-03-20T18:02:12.227Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T22:16:39.790

Modified: 2026-03-23T17:15:11.933

Link: CVE-2026-32037

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:44:16Z

Weaknesses