PT-2026-20959 · Openclaw · Openclaw

Yueyuel

·

Published

2026-02-17

·

Updated

2026-03-01

·

CVE-2026-26324

CVSS v3.1

7.5

High

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Name of the Vulnerable Software and Affected Versions OpenClaw versions prior to 2026.2.14
Description The SSRF protection in OpenClaw could be bypassed using full-form IPv4-mapped IPv6 literals, such as 0:0:0:0:0:ffff:7f00:1 (which is 127.0.0.1). This bypass allows requests that should be blocked, including those to loopback, private networks, and link-local metadata, to pass the SSRF guard. The vulnerable component is the SSRF guard (src/infra/net/ssrf.ts). The issue is an SSRF protection bypass.
Recommendations Update OpenClaw to version 2026.2.14 or later.

Exploit

Fix

SSRF

Weakness Enumeration

Related Identifiers

CVE-2026-26324
GHSA-JRVC-8FF5-2F9F

Affected Products

Openclaw