๐Ÿ” CVE Alert

CVE-2026-28476

HIGH 8.3

OpenClaw < 2026.2.14 - Server-Side Request Forgery in Tlon Extension Authentication

CVSS Score
8.3
EPSS Score
0.0%
EPSS Percentile
0th

OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the configured Urbit URL can induce the gateway to make HTTP requests to arbitrary hosts including internal addresses.

CWE CWE-918
Vendor openclaw
Product openclaw
Published Mar 5, 2026
Last Updated Mar 9, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new high vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

OpenClaw / OpenClaw
0 < 2026.2.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-pg2v-8xwh-qhcc github.com: https://github.com/openclaw/openclaw/commit/bfa7d21e997baa8e3437657d59b1e296815cc1b1 vulncheck.com: https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-in-tlon-extension-authentication

Credits

๐Ÿ” Peyton Kennedy (@p80n-sec)