CVE-2026-32019
LOW
2,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM
6,0
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: low
Integrity: low
Availability: low
Description
AI Translation Available
OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ranges can exploit web_fetch functionality to access blocked addresses such as 198.18.0.0/15 and other non-global ranges.
918
Server-Side Request Forgery (SSRF)
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Access Control
Potential Impacts:
Read Application Data
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Applicable Platforms
Technologies:
AI/ML, Web Based, Web Server
https://github.com/openclaw/openclaw/commit/333fbb86347998526dd514290adfd5f727c…
https://github.com/openclaw/openclaw/commit/44dfbd23df453e51b71ef79a148c28c53e8…
https://github.com/openclaw/openclaw/commit/71bd15bb4294d3d1b54386064d69cd0f5f7…
https://github.com/openclaw/openclaw/commit/f14ebd743cfc73f667fae80af70043d0ab1…
https://github.com/openclaw/openclaw/security/advisories/GHSA-4rqq-w8v4-7p47
https://www.vulncheck.com/advisories/openclaw-incomplete-ipv4-special-use-range…