Cyber Posture

CVE-2026-26322

High

Published: 19 February 2026

Published
19 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
EPSS Score 0.0002 5.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26322 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Service Discovery (T1046); ranked at the 5.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Other AI Platforms.

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Service Discovery (T1046) and 3 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-918

Penetration testing attempts server-side requests to internal resources, identifying SSRF weaknesses for remediation.

addresses: CWE-918

Outbound connections to external resources can be monitored and limited at the boundary, reducing SSRF impact.

addresses: CWE-918

Validates server-side URLs and resource references to block SSRF attempts.

addresses: CWE-918

Detects server-side request forgery through monitoring of unexpected outbound connections.

MITRE ATT&CK Enterprise TechniquesAI

T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1018 Remote System Discovery Discovery
Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system.
T1552.005 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
T1526 Cloud Service Discovery Discovery
An adversary may attempt to enumerate the cloud services running on a system after gaining access.
Why these techniques?

SSRF enables internal network reachability probing (T1046/T1018) and direct access to cloud metadata endpoints for service discovery and credential retrieval (T1526/T1552.005).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets. This requires the ability to…

more

invoke tools that accept `gatewayUrl` overrides (directly or indirectly). In typical setups this is limited to authenticated operators, trusted automation, or environments where tool calls are exposed to non-operators. In other words, this is not a drive-by issue for arbitrary internet users unless a deployment explicitly allows untrusted users to trigger these tool calls. Some tool call paths allowed `gatewayUrl` overrides to flow into the Gateway WebSocket client without validation or allowlisting. This meant the host could be instructed to attempt connections to non-gateway endpoints (for example, localhost services, private network addresses, or cloud metadata IPs). In the common case, this results in an outbound connection attempt from the OpenClaw host (and corresponding errors/timeouts). In environments where the tool caller can observe the results, this can also be used for limited network reachability probing. If the target speaks WebSocket and is reachable, further interaction may be possible. Starting in version 2026.2.14, tool-supplied `gatewayUrl` overrides are restricted to loopback (on the configured gateway port) or the configured `gateway.remote.url`. Disallowed protocols, credentials, query/hash, and non-root paths are rejected.

Deeper analysisAI

CVE-2026-26322 is a server-side request forgery (SSRF) vulnerability (CWE-918) in OpenClaw, a personal AI assistant, affecting versions prior to 2026.2.14. The issue resides in the Gateway tool, which accepts tool-supplied `gatewayUrl` parameters without sufficient restrictions or validation. This allows the OpenClaw host to initiate outbound WebSocket connections to arbitrary user-specified targets, including localhost services, private network addresses, or cloud metadata endpoints.

Exploitation requires low privileges (PR:L), typically limited to authenticated operators, trusted automation, or deployments where tool calls accepting `gatewayUrl` overrides are exposed to non-operators. It is not exploitable by arbitrary internet users in drive-by scenarios unless explicitly configured to allow untrusted tool invocation. Attackers can force outbound connection attempts, resulting in errors or timeouts, and in setups where results are observable, perform limited network reachability probing. If the target supports WebSocket and is reachable, further interactions may be possible. The CVSS v3.1 base score is 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L), reflecting high confidentiality impact with low integrity and availability effects.

The OpenClaw security advisory (GHSA-g6q9-8fvw-f7rf), release notes for v2026.2.14, and fixing commit (c5406e1d2434be2ef6eb4d26d8f1798d718713f4) recommend upgrading to version 2026.2.14 or later. The patch restricts tool-supplied `gatewayUrl` overrides to loopback addresses on the configured gateway port or the preconfigured `gateway.remote.url`, while rejecting disallowed protocols, credentials, query parameters, hashes, and non-root paths.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.14

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: ai

CVEs Like This One

CVE-2026-27488Same product: Openclaw Openclaw
CVE-2026-28451Same product: Openclaw Openclaw
CVE-2026-26324Same product: Openclaw Openclaw
CVE-2026-32019Same product: Openclaw Openclaw
CVE-2026-43526Same product: Openclaw Openclaw
CVE-2026-34504Same product: Openclaw Openclaw
CVE-2026-41297Same product: Openclaw Openclaw
CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-41302Same product: Openclaw Openclaw

References