CVE-2026-32019

Published: Mar 19, 2026 Last Modified: Mar 19, 2026
ExploitDB:
Other exploit source:
Google Dorks:
LOW 2,3
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM 6,0
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: low
Integrity: low
Availability: low

Description

AI Translation Available

OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ranges can exploit web_fetch functionality to access blocked addresses such as 198.18.0.0/15 and other non-global ranges.

918

Server-Side Request Forgery (SSRF)

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Access Control
Potential Impacts:
Read Application Data Execute Unauthorized Code Or Commands Bypass Protection Mechanism
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
https://github.com/openclaw/openclaw/commit/333fbb86347998526dd514290adfd5f727c…
https://github.com/openclaw/openclaw/commit/44dfbd23df453e51b71ef79a148c28c53e8…
https://github.com/openclaw/openclaw/commit/71bd15bb4294d3d1b54386064d69cd0f5f7…
https://github.com/openclaw/openclaw/commit/f14ebd743cfc73f667fae80af70043d0ab1…
https://github.com/openclaw/openclaw/security/advisories/GHSA-4rqq-w8v4-7p47
https://www.vulncheck.com/advisories/openclaw-incomplete-ipv4-special-use-range…