Impact
OpenClaw versions prior to 2026.3.28 contain an SSRF flaw in the fal provider’s image-generation component. The component downloads image data without validating the target URL, allowing attackers to request internal network addresses through the image pipeline. By exploiting this path, an attacker can expose internal service metadata and responses, potentially leaking sensitive information or facilitating further attacks. The weakness is identified as CWE‑918, reflecting untrusted input used in outbound requests.
Affected Systems
The affected systems are OpenClaw, specifically the OpenClaw application running on Node.js. Any installation using a version older than 2026.3.28 is vulnerable. No further vendor or product detail is provided.
Risk and Exploitability
The CVSS score of 6.9 indicates medium severity. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting limited public exploitation data. Nevertheless, the flaw can be triggered by any user able to interact with the fal provider component, and a compromised fal relay can serve as an internal pivot to exfiltrate data. The lack of CEI and KEV status does not diminish the potential impact within the affected environment.
OpenCVE Enrichment
Github GHSA