Impact
OpenClaw versions prior to 2026.3.25 contain an SSRF flaw in channel extensions that do not protect configured base URLs in fetch() calls. Attackers can force the server to request arbitrary URLs, potentially reaching blocked internal resources, thereby leaking sensitive data and modifying internal state. The weakness aligns with CWE‑918, indicating a failure to validate or sanitize outbound network requests.
Affected Systems
The vulnerability impacts the OpenClaw platform, specifically all channel extensions shipped with releases before 2026.3.25. The affected component is the Node.js‑based server component that performs unguarded fetch operations to configured endpoints and operates under the OpenClaw product umbrella.
Risk and Exploitability
The CVSS score of 5.3 signals moderate severity, and the lack of an EPSS rating or KEV listing suggests limited publicly known exploitation activity. Attackers would need network access to the OpenClaw instance to trigger the vulnerable fetch calls. The flaw exposes internal network resources and could be leveraged for data exfiltration or lateral movement. The risk level warrants taking action before a public exploit becomes available.
OpenCVE Enrichment
Github GHSA