Description
OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability in multiple channel extensions that fail to properly guard configured base URLs against SSRF attacks. Attackers can exploit unprotected fetch() calls against configured endpoints to rebind requests to blocked internal destinations and access restricted resources.
Published: 2026-04-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.25 contain an SSRF flaw in channel extensions that do not protect configured base URLs in fetch() calls. Attackers can force the server to request arbitrary URLs, potentially reaching blocked internal resources, thereby leaking sensitive data and modifying internal state. The weakness aligns with CWE‑918, indicating a failure to validate or sanitize outbound network requests.

Affected Systems

The vulnerability impacts the OpenClaw platform, specifically all channel extensions shipped with releases before 2026.3.25. The affected component is the Node.js‑based server component that performs unguarded fetch operations to configured endpoints and operates under the OpenClaw product umbrella.

Risk and Exploitability

The CVSS score of 5.3 signals moderate severity, and the lack of an EPSS rating or KEV listing suggests limited publicly known exploitation activity. Attackers would need network access to the OpenClaw instance to trigger the vulnerable fetch calls. The flaw exposes internal network resources and could be leveraged for data exfiltration or lateral movement. The risk level warrants taking action before a public exploit becomes available.

Generated by OpenCVE AI on April 9, 2026 at 22:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.25 or newer

Generated by OpenCVE AI on April 9, 2026 at 22:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rhfg-j8jq-7v2h OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extensions (Incomplete Fix for CVE-2026-28476)
History

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability in multiple channel extensions that fail to properly guard configured base URLs against SSRF attacks. Attackers can exploit unprotected fetch() calls against configured endpoints to rebind requests to blocked internal destinations and access restricted resources.
Title OpenClaw < 2026.3.25 - Server-Side Request Forgery via Unguarded Configured Base URLs in Channel Extensions
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-918
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-10T15:55:13.953Z

Reserved: 2026-04-04T12:29:42.738Z

Link: CVE-2026-35629

cve-icon Vulnrichment

Updated: 2026-04-10T15:52:40.830Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:31.603

Modified: 2026-04-15T20:09:39.580

Link: CVE-2026-35629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:32Z

Weaknesses