Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.3

OpenClaw versions prior to 2026.2.2 allow hackers to access internal files

CVE-2026-28467 GHSA-wfp2-v9c7-fh79
Summary

Some versions of OpenClaw are at risk of being tricked into showing or sending internal files to attackers. This can happen when an attacker influences how files are attached or sent to others. To fix this, update to version 2026.2.2 or later.

What to do
  • Update steipete openclaw to version 2026.2.2.
Affected software
VendorProductAffected versionsFix available
steipete openclaw <= 2026.2.2 2026.2.2
openclaw openclaw <= 2026.2.2 –
Original title
OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers...
Original description
OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlled sendAttachment or auto-reply mechanisms can trigger SSRF to internal resources and exfiltrate fetched response bytes as outbound attachments.
nvd CVSS3.1 6.5
nvd CVSS4.0 6.3
Vulnerability type
CWE-918 Server-Side Request Forgery (SSRF)
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026