Server-Side Request Forgery in OpenClaw by OpenClaw
CVE-2026-35629

5.3MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-35629?

OpenClaw versions prior to 2026.3.25 are susceptible to a server-side request forgery issue due to inadequate protections on configured base URLs within multiple channel extensions. This vulnerability allows attackers to exploit unguarded fetch() calls targeting configured endpoints, which could enable them to redirect requests to internal systems that are typically secured against external access, thereby exposing restricted resources.

Affected Version(s)

OpenClaw 0 < 2026.3.25

OpenClaw 2026.3.25

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

YLChen-007
.