Home

Description

OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/gateway/server-cron.ts uses fetch() directly, so webhook targets can reach private/metadata/internal endpoints without SSRF policy checks. This issue was fixed in version 2026.2.19.

PUBLISHED Reserved 2026-02-19 | Published 2026-02-21 | Updated 2026-02-24 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:L

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 2026.2.19
affected

References

github.com/...enclaw/security/advisories/GHSA-w45g-5746-x9fp

github.com/...ommit/99db4d13e5c139883ef0def9ff963e9273179655

github.com/openclaw/openclaw/releases/tag/v2026.2.19

cve.org (CVE-2026-27488)

nvd.nist.gov (CVE-2026-27488)

Download JSON