Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.3
OpenClaw versions prior to 2026.2.2 allow hackers to access internal files
CVE-2026-28467
GHSA-wfp2-v9c7-fh79
Summary
Some versions of OpenClaw are at risk of being tricked into showing or sending internal files to attackers. This can happen when an attacker influences how files are attached or sent to others. To fix this, update to version 2026.2.2 or later.
What to do
- Update steipete openclaw to version 2026.2.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| steipete | openclaw | <= 2026.2.2 | 2026.2.2 |
| openclaw | openclaw | <= 2026.2.2 | – |
Original title
OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers...
Original description
OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlled sendAttachment or auto-reply mechanisms can trigger SSRF to internal resources and exfiltrate fetched response bytes as outbound attachments.
nvd CVSS3.1
6.5
nvd CVSS4.0
6.3
Vulnerability type
CWE-918
Server-Side Request Forgery (SSRF)
- https://github.com/openclaw/openclaw/commit/81c68f582d4a9a20d9cca9f367d2da9edc5a...
- https://github.com/openclaw/openclaw/commit/9bd64c8a1f91dda602afc1d5246a2ff2be16...
- https://github.com/openclaw/openclaw/security/advisories/GHSA-wfp2-v9c7-fh79
- https://www.vulncheck.com/advisories/openclaw-ssrf-via-attachment-media-url-hydr...
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.2
- https://nvd.nist.gov/vuln/detail/CVE-2026-28467
- https://github.com/advisories/GHSA-wfp2-v9c7-fh79
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026