๐Ÿ” CVE Alert

CVE-2026-28467

MEDIUM 6.5

OpenClaw < 2026.2.2 - SSRF via Attachment Media URL Hydration

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlled sendAttachment or auto-reply mechanisms can trigger SSRF to internal resources and exfiltrate fetched response bytes as outbound attachments.

CWE CWE-918
Vendor openclaw
Product openclaw
Published Mar 5, 2026
Last Updated Mar 9, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new medium vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

OpenClaw / OpenClaw
0 < 2026.2.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-wfp2-v9c7-fh79 github.com: https://github.com/openclaw/openclaw/commit/81c68f582d4a9a20d9cca9f367d2da9edc5a65ae github.com: https://github.com/openclaw/openclaw/commit/9bd64c8a1f91dda602afc1d5246a2ff2be164647 vulncheck.com: https://www.vulncheck.com/advisories/openclaw-ssrf-via-attachment-media-url-hydration

Credits

๐Ÿ” Petr Simecek (@simecek) Stanislav Fort, Aisle Research, www.aisle.com