Cyber Posture

CVE-2026-22181

HighPublic PoC

Published: 18 March 2026

Published
18 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
EPSS Score 0.0006 17.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22181 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of the specific flaw in OpenClaw by patching to version 2026.3.2 or later, directly eliminating the DNS pinning bypass via proxy environment variables.

prevent

Mandates validation of attacker-influenced URLs in strict fetch paths to block SSRF bypasses through proxy-routed access to internal targets.

prevent

Enforces information flow policies to restrict unauthorized server-side requests from reaching internal resources via proxy behavior in URL fetching.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF bypass in public-facing web application directly enables exploitation of the app to reach internal resources.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass vulnerability in strict URL fetch paths that allows attackers to circumvent SSRF guards when environment proxy variables are configured. When HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables are present, attacker-influenced URLs…

more

can be routed through proxy behavior instead of pinned-destination routing, enabling access to internal targets reachable from the proxy environment.

Deeper analysisAI

CVE-2026-22181, published on 2026-03-18, is a DNS pinning bypass vulnerability classified under CWE-918 (Server-Side Request Forgery) that affects OpenClaw versions prior to 2026.3.2. The issue resides in strict URL fetch paths, where the presence of environment proxy variables such as HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY enables attackers to circumvent SSRF guards. Instead of adhering to pinned-destination routing, attacker-influenced URLs are routed through proxy behavior, allowing access to internal targets reachable from the proxy environment.

With a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L), the vulnerability can be exploited by low-privileged users over the network with low attack complexity and no user interaction. Exploitation bypasses SSRF protections to reach internal resources via the proxy, resulting in high confidentiality impact—such as unauthorized data access—along with low integrity and availability effects.

Advisories recommend updating to OpenClaw version 2026.3.2 or later to mitigate the issue. Relevant details are provided in the patching commit at https://github.com/openclaw/openclaw/commit/345abf0b2e0f43b0f229e96f252ebf56f1e5549e, the GitHub security advisory at https://github.com/openclaw/openclaw/security/advisories/GHSA-8mvx-p2r9-r375, and the VulnCheck advisory at https://www.vulncheck.com/advisories/openclaw-dns-pinning-bypass-via-environment-proxy-configuration-in-web-fetch.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.3.2

CVEs Like This One

CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw
CVE-2026-28476Same product: Openclaw Openclaw
CVE-2026-6011Same product: Openclaw Openclaw
CVE-2026-41914Same product: Openclaw Openclaw
CVE-2026-41302Same product: Openclaw Openclaw
CVE-2026-43526Same product: Openclaw Openclaw
CVE-2026-42439Same product: Openclaw Openclaw
CVE-2026-34504Same product: Openclaw Openclaw

References