PT-2026-20959 · Openclaw · Openclaw
Yueyuel
·
Published
2026-02-17
·
Updated
2026-03-01
·
CVE-2026-26324
CVSS v3.1
7.5
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
OpenClaw versions prior to 2026.2.14
Description
The SSRF protection in OpenClaw could be bypassed using full-form IPv4-mapped IPv6 literals, such as
0:0:0:0:0:ffff:7f00:1 (which is 127.0.0.1). This bypass allows requests that should be blocked, including those to loopback, private networks, and link-local metadata, to pass the SSRF guard. The vulnerable component is the SSRF guard (src/infra/net/ssrf.ts). The issue is an SSRF protection bypass.Recommendations
Update OpenClaw to version 2026.2.14 or later.
Exploit
Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw