CVE-2026-26324
📋 TL;DR
OpenClaw's SSRF protection could be bypassed using IPv4-mapped IPv6 addresses, allowing attackers to access restricted internal resources like localhost or private networks. This affects all OpenClaw installations prior to version 2026.2.14. Users of vulnerable versions are at risk of SSRF attacks.
💻 Affected Systems
- OpenClaw
📦 What is this software?
Openclaw by Openclaw
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal services, cloud metadata, or perform lateral movement within the network.
Likely Case
Information disclosure from internal services or metadata endpoints accessible via SSRF.
If Mitigated
Limited impact if network segmentation restricts internal access or if additional SSRF protections exist.
🎯 Exploit Status
Exploitation requires sending specially crafted IPv6 addresses to bypass SSRF filters.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2026.2.14
Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-jrvc-8ff5-2f9f
Restart Required: Yes
Instructions:
1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the patch is applied.
🔧 Temporary Workarounds
Network-based filtering
allBlock outbound requests to internal IP ranges at the network level.
WAF rule
allAdd a WAF rule to block requests containing IPv4-mapped IPv6 addresses.
🧯 If You Can't Patch
- Restrict OpenClaw's outbound network access to only necessary external endpoints.
- Implement additional SSRF validation at the application layer.
🔍 How to Verify
Check if Vulnerable:
Check if OpenClaw version is below 2026.2.14.
Check Version:
openclaw --version
Verify Fix Applied:
Confirm OpenClaw version is 2026.2.14 or higher and test SSRF protection with IPv4-mapped IPv6 addresses.
📡 Detection & Monitoring
Log Indicators:
- Requests containing IPv4-mapped IPv6 addresses (e.g., 0:0:0:0:0:ffff:7f00:1) in logs.
Network Indicators:
- Outbound connections from OpenClaw to internal IP ranges.
SIEM Query:
source="openclaw" AND (uri="*0:0:0:0:0:ffff:*" OR dest_ip IN private_ranges)