Impact
A weakness in OpenClaw’s assertPublicHostname handler within the web‑fetch.ts component allows an attacker to craft a request that forces the server to issue arbitrary HTTP requests to internal or external resources. This server‑side request forgery (SSRF) gives a remote attacker the capacity to bypass network restrictions, exfiltrate sensitive data, or further pivot into internal systems. The vulnerability is grouped under CWE‑918 and carries moderate severity as reflected by its CVSS score of 6.3. The impact can compromise confidentiality, integrity, and availability of internal services that the affected server attempts to access, potentially affecting the entire system if the server functions as part of a larger infrastructure.
Affected Systems
OpenClaw applications released through version 2026.1.26 or earlier are affected. The issue resides in the component located at src/agents/tools/web-fetch.ts, and the affected functionality is the assertPublicHostname handler. Upgrading to OpenClaw 2026.1.29, which incorporates commit b623557a2ec7e271bda003eb3ac33fbb2e218505, resolves the vulnerability.
Risk and Exploitability
The exploit is known to be difficult, and the available public exploit increases the risk of adoption by threat actors. Although the EPSS score is not provided, the issuance of a public exploit coupled with a moderate CVSS score signals a non‑negligible risk. The attack vector is remote, requiring an attacker to send a crafted request to the vulnerable OpenClaw instance. The vulnerability is not listed in the CISA KEV catalog, but uncontrolled internal requests can still lead to data leakage or lateral movement if the internal network is not properly segmented.
OpenCVE Enrichment