CVE-2026-26322
Published: 19 February 2026
Summary
CVE-2026-26322 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Service Discovery (T1046); ranked at the 5.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
This vulnerability is AI-related — categorised as Other AI Platforms.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing attempts server-side requests to internal resources, identifying SSRF weaknesses for remediation.
Outbound connections to external resources can be monitored and limited at the boundary, reducing SSRF impact.
Validates server-side URLs and resource references to block SSRF attempts.
Detects server-side request forgery through monitoring of unexpected outbound connections.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF enables internal network reachability probing (T1046/T1018) and direct access to cloud metadata endpoints for service discovery and credential retrieval (T1526/T1552.005).
NVD Description
OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets. This requires the ability to…
more
invoke tools that accept `gatewayUrl` overrides (directly or indirectly). In typical setups this is limited to authenticated operators, trusted automation, or environments where tool calls are exposed to non-operators. In other words, this is not a drive-by issue for arbitrary internet users unless a deployment explicitly allows untrusted users to trigger these tool calls. Some tool call paths allowed `gatewayUrl` overrides to flow into the Gateway WebSocket client without validation or allowlisting. This meant the host could be instructed to attempt connections to non-gateway endpoints (for example, localhost services, private network addresses, or cloud metadata IPs). In the common case, this results in an outbound connection attempt from the OpenClaw host (and corresponding errors/timeouts). In environments where the tool caller can observe the results, this can also be used for limited network reachability probing. If the target speaks WebSocket and is reachable, further interaction may be possible. Starting in version 2026.2.14, tool-supplied `gatewayUrl` overrides are restricted to loopback (on the configured gateway port) or the configured `gateway.remote.url`. Disallowed protocols, credentials, query/hash, and non-root paths are rejected.
Deeper analysisAI
CVE-2026-26322 is a server-side request forgery (SSRF) vulnerability (CWE-918) in OpenClaw, a personal AI assistant, affecting versions prior to 2026.2.14. The issue resides in the Gateway tool, which accepts tool-supplied `gatewayUrl` parameters without sufficient restrictions or validation. This allows the OpenClaw host to initiate outbound WebSocket connections to arbitrary user-specified targets, including localhost services, private network addresses, or cloud metadata endpoints.
Exploitation requires low privileges (PR:L), typically limited to authenticated operators, trusted automation, or deployments where tool calls accepting `gatewayUrl` overrides are exposed to non-operators. It is not exploitable by arbitrary internet users in drive-by scenarios unless explicitly configured to allow untrusted tool invocation. Attackers can force outbound connection attempts, resulting in errors or timeouts, and in setups where results are observable, perform limited network reachability probing. If the target supports WebSocket and is reachable, further interactions may be possible. The CVSS v3.1 base score is 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L), reflecting high confidentiality impact with low integrity and availability effects.
The OpenClaw security advisory (GHSA-g6q9-8fvw-f7rf), release notes for v2026.2.14, and fixing commit (c5406e1d2434be2ef6eb4d26d8f1798d718713f4) recommend upgrading to version 2026.2.14 or later. The patch restricts tool-supplied `gatewayUrl` overrides to loopback addresses on the configured gateway port or the preconfigured `gateway.remote.url`, while rejecting disallowed protocols, credentials, query parameters, hashes, and non-root paths.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: ai